Quantum machine learning for security assessment in the Internet of Medical Things (IoMT)
Internet of Medical Things (IoMT) is an ecosystem composed of connected electronic items
such as small sensors/actuators and other cyber-physical devices (CPDs) in medical …
such as small sensors/actuators and other cyber-physical devices (CPDs) in medical …
Deep learning-based solution for smart contract vulnerabilities detection
X Tang, Y Du, A Lai, Z Zhang, L Shi - Scientific Reports, 2023 - nature.com
This paper aims to explore the application of deep learning in smart contract vulnerabilities
detection. Smart contracts are an essential part of blockchain technology and are crucial for …
detection. Smart contracts are an essential part of blockchain technology and are crucial for …
A cosine similarity-based labeling technique for vulnerability type detection using source codes
MM Öztürk - Computers & Security, 2024 - Elsevier
Vulnerability detection is of great importance in providing reliability to software systems.
Although existing methods achieve remarkable success in vulnerability detection, they have …
Although existing methods achieve remarkable success in vulnerability detection, they have …
Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature …
Software vulnerabilities pose a significant threat to system security, necessitating effective
automatic detection methods. Current techniques face challenges such as dependency …
automatic detection methods. Current techniques face challenges such as dependency …
A secure network path of implantable medical devices for detecting the vulnerabilities using hybrid DBNF network
C Thyagarajan, SV Bhanu, S Suthir - Biomedical Signal Processing and …, 2024 - Elsevier
IoT is complicated as it contains a huge number of devices which saves data and promotes
functionality of each device. Generally, such models include real-time functioning as it is a …
functionality of each device. Generally, such models include real-time functioning as it is a …
IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications
The proliferation of the Internet of Things (IoT) paradigm has ushered in a new era of
connectivity and convenience. Consequently, rapid IoT expansion has introduced …
connectivity and convenience. Consequently, rapid IoT expansion has introduced …
[HTML][HTML] VulnMiner: A comprehensive framework for vulnerability collection from C/C++ source code projects
The study introduces VulnMiner, a comprehensive framework encompassing a data
extraction tool tailored for identifying vulnerabilities in C/C++ source code. Moreover, it …
extraction tool tailored for identifying vulnerabilities in C/C++ source code. Moreover, it …
[PDF][PDF] Shumaila Hussain, Muhammad Nadeem 3, Junaid Baber 2, 4, Mohammed Hamdi 5
Software vulnerabilities pose a significant threat to system security, necessitating effective
automatic detection methods. Current techniques face challenges such as dependency …
automatic detection methods. Current techniques face challenges such as dependency …
A Smart Framework to Detect Threats and Protect Data of IoT based on Machine Learning
The widespread use of IoT devices has introduced new challenges, particularly related to
security and privacy threats such as unauthorized data access and device breaches. The …
security and privacy threats such as unauthorized data access and device breaches. The …
Detect-IoT: A Comparative Analysis of Machine Learning Algorithms for Detecting Compromised IoT Devices
YR Siwakoti, DB Rawat - Proceedings of the Twenty-fourth International …, 2023 - dl.acm.org
The rapid expansion of IoT brings unmatched convenience and connectivity, but it also
raises significant security concerns. The prioritization of functionality over security in IoT …
raises significant security concerns. The prioritization of functionality over security in IoT …