[1] |
Hang XU, Zhi YANG, Xingyuan CHEN, Bing HAN, Xuehui DU.
Coverage-guided fuzzing based on adaptive sensitive region mutation
[J]. Journal of Computer Applications, 2024, 44(8): 2528-2535.
|
[2] |
Jinhui CAI, Zhongxu YIN, Guoxiao ZONG, Junru LI.
Integrated method of inference and taint analysis for nested branch breakthrough
[J]. Journal of Computer Applications, 2024, 44(12): 3823-3830.
|
[3] |
Yixi LIU, Jun HE, Bo WU, Bingtong LIU, Ziyu LI.
Survey of software security testing techniques in DevSecOps
[J]. Journal of Computer Applications, 2024, 44(11): 3470-3478.
|
[4] |
Kun ZHANG, Fengyu YANG, Fa ZHONG, Guangdong ZENG, Shijian ZHOU.
Source code vulnerability detection based on hybrid code representation
[J]. Journal of Computer Applications, 2023, 43(8): 2517-2526.
|
[5] |
Juncheng TONG, Bo ZHAO.
Review on blockchain smart contract vulnerability detection and automatic repair
[J]. Journal of Computer Applications, 2023, 43(3): 785-793.
|
[6] |
Min WEN, Rongcun WANG, Shujuan JIANG.
Source code vulnerability detection based on relational graph convolution network
[J]. Journal of Computer Applications, 2022, 42(6): 1814-1821.
|
[7] |
Cheng FAN, Buhong WANG, Jiwei TIAN.
Cascading failure model in aviation network considering overload condition and failure probability
[J]. Journal of Computer Applications, 2022, 42(2): 502-509.
|
[8] |
NI Ping, CHEN Wei.
Reflective cross-site scripting vulnerability detection based on fuzzing test
[J]. Journal of Computer Applications, 2021, 41(9): 2594-2601.
|
[9] |
ZHAO Wei, ZHANG Wenyin, WANG Jiuru, WANG Haifeng, WU Chuankun.
Smart contract vulnerability detection scheme based on symbol execution
[J]. Journal of Computer Applications, 2020, 40(4): 947-953.
|
[10] |
REN Yuzhu, ZHANG Youwei, AI Chengwei.
Survey on taint analysis technology
[J]. Journal of Computer Applications, 2019, 39(8): 2302-2309.
|
[11] |
FU Menglin, WU Lifa, HONG Zheng, FENG Wenbo.
Research on vulnerability mining technique for smart contracts
[J]. Journal of Computer Applications, 2019, 39(7): 1959-1966.
|
[12] |
WANG Jiaxin, FENG Yi, YOU Rui.
Network security measurment based on dependency relationship graph and common vulnerability scoring system
[J]. Journal of Computer Applications, 2019, 39(6): 1719-1727.
|
[13] |
ZHANG Hanfang, ZHOU Anmin, JIA Peng, LIU Luping, LIU Liang.
Directed fuzzing method for binary programs
[J]. Journal of Computer Applications, 2019, 39(5): 1389-1393.
|
[14] |
XIE Lixia, XU Weihua.
Improved weight distribution method of vulnerability basic scoring index
[J]. Journal of Computer Applications, 2017, 37(6): 1630-1635.
|
[15] |
ZHOU Min, ZHOU Anmin, LIU Liang, JIA Peng, TAN Cuijiang.
Mining denial of service vulnerability in Android applications automatically
[J]. Journal of Computer Applications, 2017, 37(11): 3288-3293.
|