VULNERABILITIES

作品数:92被引量:86H指数:5
导出分析报告
相关领域:自动化与计算机技术更多>>
相关机构:湖南大学佛罗里达州立大学杭州电子科技大学武汉纺织大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划World Health Organization国家高技术研究发展计划更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
GMS:A Novel Method for Detecting Reentrancy Vulnerabilities in Smart Contracts
《Computers, Materials & Continua》2025年第5期2207-2220,共14页Dawei Xu Fan Huang Jiaxin Zhang Yunfang Liang Baokun Zheng Jian Zhao 
supported by theHigher Education Research Project of Jilin Province:JGJX24C118;the National Defense Basic Scientific Research Program of China(No.JCKY2023602C026).
With the rapid proliferation of Internet ofThings(IoT)devices,ensuring their communication security has become increasingly important.Blockchain and smart contract technologies,with their decentralized nature,provide ...
关键词:Smart contract Internet of Things reentrancy vulnerabilities graph neural network 
Robust Detection and Analysis of Smart Contract Vulnerabilities with Large Language Model Agents
《Journal of Information Security》2025年第1期197-226,共30页Nishank P. Kuppa Vijay K. Madisetti 
Smart contracts on the Ethereum blockchain continue to revolutionize decentralized applications (dApps) by allowing for self-executing agreements. However, bad actors have continuously found ways to exploit smart cont...
关键词:Blockchain Ethereum Smart Contracts Security Decentralized Applications WEB3 Cryptocurrency Large Language Models 
A Review of Human Vulnerabilities in Cyber Security: Challenges and Solutions for Microfinance Institutions
《Journal of Information Security》2025年第1期114-130,共17页Evaline Waweru Simon Maina Karume Alex Kibet 
This review examines human vulnerabilities in cybersecurity within Microfinance Institutions, analyzing their impact on organizational resilience. Focusing on social engineering, inadequate security training, and weak...
关键词:Human Vulnerabilities CYBERSECURITY Microfinance Institutions Cyber Threats Cybersecurity Awareness Risk Mitigation 
Exploring Cyber Threat Intelligence into Land Administration Systems for Enhanced Cyber Resilience
《Journal of Geographic Information System》2025年第1期45-65,共21页Pierre-François Blin Trias Aditya Purnama Budi Santosa Christophe Claramunt 
The current global cybersecurity landscape, characterized by the increasing scale and sophistication of cyberattacks, underscores the importance of integrating Cyber Threat Intelligence (CTI) into Land Administration ...
关键词:Cyber Threat Intelligence Common Vulnerabilities and Exposures Geodata Land Administration Systems Risk Assessment Spatial Cadastral Data 
Integrative single-cell and bulk transcriptomes analyses reveals heterogeneity of serine-glycine-one-carbon metabolism with distinct prognoses and therapeutic vulnerabilities in HNSCC
《International Journal of Oral Science》2024年第4期711-727,共17页Lixuan Wang Rongchun Yang Yue Kong Jing Zhou Yingyao Chen Rui Li Chuwen Chen Xinran Tang Xiaobing Chen Juan Xia Xijuan Chen Bin Cheng Xianyue Ren 
supported by grants from the GuangDong Basic and Applied Basic Research Foundation(No.2023A1515030121,No.2021A1515111020,No.2023A1515010246);the National Natural Science Foundation of China(No.82273148,No.82103555,No.82301086);the Science and Technology Projects in Guangzhou(No.202206080009)。
Metabolic heterogeneity plays a central role in sustaining uncontrolled cancer cell proliferation and shaping the tumor microenvironment(TME),which significantly compromises the clinical outcomes and responses to ther...
关键词:metabolism therapeutic precise 
A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges被引量:1
《Journal of Information and Intelligence》2024年第6期455-513,共59页Tinshu Sasi Arash Habibi Lashkari Rongxing Lu Pulei Xiong Shahrear Iqbal 
supported in part by collaborative research funding from the National Research Council of Canada's Artificial Ir elligence for Logistics Program.
The Internet of Things(loT)has set the way for the continuing digitalization of society in various manners during the past decade.The IoT is a vast network of intelligent devices exchanging data online.The security co...
关键词:Internet of Things IoTattacks TAXONOMY VULNERABILITIES Detectionmethods CHALLENGES 
Blockchain-Enabled Mitigation Strategies for Distributed Denial of Service Attacks in IoT Sensor Networks:An Experimental Approach
《Computers, Materials & Continua》2024年第12期3679-3705,共27页Kithmini Godewatte Arachchige Mohsin Murtaza Chi-Tsun Cheng Bader M.Albahlal Cheng-Chi Lee 
supported and funded by the Deanship of Scientific Research at Imam Mohammad Ibn Saud Islamic University(IMSIU)(Grant number IMSIU-RP23017).
Information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats,with Internet of Things(IoT)security gaining particular attention due to its role in data commu...
关键词:Blockchain cyber intrusions DDOS IOT low powered sensors VULNERABILITIES wireless network 
Living Conditions Vulnerabilities of Farm Households in Cotton-Growing Areas of Northern Benin
《Agricultural Sciences》2024年第12期1353-1370,共18页Kassimou Issaka Emmanuel Yaï Francis Oninkitan Agani Jacob Afouda Yabi 
The vulnerability of farms to the effects of climate change weighs heavily and indirectly on the living conditions of farming households in northern Benin. This article analyses the vulnerability of cotton-growing hou...
关键词:VULNERABILITY Farm Households Living Conditions Climate Change 
Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems
《Computers, Materials & Continua》2024年第11期3189-3220,共32页Mohammed Amin Almaiah Leen Mohammad Saqr Leen Ahmad Al-Rawwash Layan Ahmed Altellawi Romel Al-Ali Omar Almomani 
supported by the Deanship of Scientific Research,Vice Presidency for Graduate Studies and Scientific Research,King Faisal University,Saudi Arabia(Grant No.KFU242068).
Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store.Despite the increasing reliance on database management systems,this field continues...
关键词:Cyber threats database systems cyber risk assessment VULNERABILITIES COUNTERMEASURES 
Integrate and conquer:pan-cancer proteogenomics uncovers cancer vulnerabilities and therapeutic opportunities
《Signal Transduction and Targeted Therapy》2024年第11期4776-4778,共3页Debomita Chakraborty Rossana Romero Krishnaraj Rajalingam 
supported from a DKH grant(DKH 70113042);the CRC 1292(TP05)to K.R.K.R.
In a recent article published in Cell by Savage et al.,the authors developed a computational workflow for integrating multi-omics data from readily available public online databases to provide novel insights into the ...
关键词:CANCER therapeutic 
检索报告 对象比较 聚类工具 使用帮助 返回顶部