Articles with "security vulnerabilities" as a keyword



Photo from wikipedia

Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study

Sign Up to like & get
recommendations!
Published in 2020 at "Arabian Journal for Science and Engineering"

DOI: 10.1007/s13369-019-04319-2

Abstract: There has been a tremendous increase in research in the area of cyber security to support cyber applications and to avoid key security threats faced by these applications. The goal of this study is to… read more here.

Keywords: study; security threats; cyber security; security ... See more keywords
Photo from wikipedia

On the Spectre and Meltdown Processor Security Vulnerabilities

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Micro"

DOI: 10.1109/mm.2019.2897677

Abstract: This paper first reviews the Spectre and Meltdown processor security vulnerabilities that were revealed during January–October 2018 and that allow the extraction of protected information from billions of processors in large and small systems. It… read more here.

Keywords: meltdown processor; processor security; spectre meltdown; security vulnerabilities ... See more keywords
Photo by campaign_creators from unsplash

Investigating Security Vulnerabilities in a Hot Data Center with Reduced Cooling Redundancy

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2020.2977292

Abstract: Data centers have been growing rapidly in recent years to meet the surging demand of cloud services. However, the expanding scale and powerful servers generate a great amount of heat, resulting in significant cooling costs.… read more here.

Keywords: thermal attacks; data centers; security vulnerabilities; center ... See more keywords
Photo by dawson2406 from unsplash

How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Software Engineering"

DOI: 10.1109/tse.2018.2810116

Abstract: While using security tools to resolve security defects, software developers must apply considerable effort. Success depends on a developer's ability to interact with tools, ask the right questions, and make strategic decisions. To build better… read more here.

Keywords: static analysis; analysis tool; security; software ... See more keywords
Photo by scottwebb from unsplash

Are Source Code Metrics "Good Enough" in Predicting Security Vulnerabilities?

Sign Up to like & get
recommendations!
Published in 2022 at "Data"

DOI: 10.3390/data7090127

Abstract: Modern systems produce and handle a large volume of sensitive enterprise data. Therefore, security vulnerabilities in the software systems must be identified and resolved early to prevent security breaches and failures. Predicting security vulnerabilities is… read more here.

Keywords: predicting security; security; source code; security vulnerabilities ... See more keywords