共 50 条
- [21] Analysis on password protection in Android applications 2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 504 - 507
- [22] Unintentional Bugs to Vulnerability Mapping in Android Applications 2015 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2015, : 176 - 178
- [24] LaChouTi: Kernel Vulnerability Responding Framework for the Fragmented Android Devices ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING, 2017, : 920 - 925
- [25] An empirical investigation into open source web applications’ implementation vulnerabilities Empirical Software Engineering, 2010, 15 : 556 - 576
- [27] Vulnerabilities in Web applications painful lessons; Advice (UN)heeded? 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL X, PROCEEDINGS: SYSTEMICS AND INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 223 - 228
- [28] Poster Abstract: Analysis of Cyber-Security Vulnerabilities of Interconnected Medical Devices 2019 4TH IEEE/ACM INTERNATIONAL CONFERENCE ON CONNECTED HEALTH: APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2019, : 23 - 24
- [29] A comparative analysis of Buffer Overflow vulnerabilities in High-End IoT devices 2022 IEEE 12TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2022, : 694 - 701