共 50 条
- [41] PDGraph: A Large-Scale Empirical Study on Project Dependency of Security Vulnerabilities 51ST ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2021), 2021, : 161 - 173
- [42] Security Vulnerabilities in Categories of Clones and Non-Cloned Code: An Empirical Study 11TH ACM/IEEE INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT (ESEM 2017), 2017, : 20 - 29
- [43] An analysis of security vulnerabilities in container images for scientific data analysis GIGASCIENCE, 2021, 10 (06):
- [44] Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 605 - 620
- [46] An analysis of the Security Threats and Vulnerabilities of Cloud Computing in Oman 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS IEEE INCOS 2015, 2015, : 423 - 428
- [47] Uncovering security vulnerabilities through multiplatform malware analysis SECURITY AND PRIVACY, 2025, 8 (01):
- [48] Analysis of Common Vulnerabilities and Exposures to Produce Security Trends PROCEEDINGS OF THE 2022 INTERNATIONAL CONFERENCE ON CYBER SECURITY, CSW 2022, 2022, : 16 - 19
- [49] Security analysis of vulnerabilities and threats for medical information systems ICIC Express Letters, 2015, 9 (03): : 849 - 854