Vulnerability Detection System (Xposed)
As the world becomes increasingly digitized, software systems have become a primary target for cyber attackers. With the proliferation of new technologies and the growing complexity of software systems, the number of vulnerabilities present in these systems has also grown. These vulnerabilities can...
Saved in:
Main Author: | Nurin Azyyati, Kamilizahri |
---|---|
Format: | Undergraduates Project Papers |
Language: | English |
Published: |
2023
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/40876/1/CB20155.pdf http://umpir.ump.edu.my/id/eprint/40876/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches
by: Hanif, Hazim, et al.
Published: (2021) -
Biologically Inspired Execution Framework for
Vulnerable Workflow Systems
by: Safdar, S., et al.
Published: (2009) -
Effective Methods for Secure Authentication in Vulnerable Workflows using nxn Passwords
by: Safdar, S., et al.
Published: (2011) -
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011) -
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)