Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6)
  • Open Access

    ARTICLE

    SMINER: Detecting Unrestricted and Misimplemented Behaviors of Software Systems Based on Unit Test Cases

    Kyungmin Sim, Jeong Hyun Yi, Haehyun Cho*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3257-3274, 2023, DOI:10.32604/cmc.2023.036695

    Abstract Despite the advances in automated vulnerability detection approaches, security vulnerabilities caused by design flaws in software systems are continuously appearing in real-world systems. Such security design flaws can bring unrestricted and misimplemented behaviors of a system and can lead to fatal vulnerabilities such as remote code execution or sensitive data leakage. Therefore, it is an essential task to discover unrestricted and misimplemented behaviors of a system. However, it is a daunting task for security experts to discover such vulnerabilities in advance because it is time-consuming and error-prone to analyze the whole code in detail. Also, most of the existing vulnerability… More >

  • Open Access

    ARTICLE

    Security Threat and Vulnerability Assessment and Measurement in Secure Software Development

    Mamoona Humayun1, NZ Jhanjhi2,*, Maram Fahhad Almufareh1, Muhammad Ibrahim Khalil3

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5039-5059, 2022, DOI:10.32604/cmc.2022.019289

    Abstract Security is critical to the success of software, particularly in today's fast-paced, technology-driven environment. It ensures that data, code, and services maintain their CIA (Confidentiality, Integrity, and Availability). This is only possible if security is taken into account at all stages of the SDLC (Software Development Life Cycle). Various approaches to software quality have been developed, such as CMMI (Capability maturity model integration). However, there exists no explicit solution for incorporating security into all phases of SDLC. One of the major causes of pervasive vulnerabilities is a failure to prioritize security. Even the most proactive companies use the “patch and… More >

  • Open Access

    ARTICLE

    KNEMAG: Key Node Estimation Mechanism Based on Attack Graph for IoT Security

    Bichen Che1, Long Liu2,*, Huali Zhang1

    Journal on Internet of Things, Vol.2, No.4, pp. 145-162, 2020, DOI:10.32604/jiot.2020.010035

    Abstract With the rapid development and widespread application of the IoT, the at-tacks against IoT vulnerabilities have become more complex and diverse. Most of the previous research focused on node vulnerability and its risk analysis. There is little information available about the importance of the location of the node in the system. Therefore, an estimation mechanism is proposed to assess the key node of the IoT system. The estimation of the key node includes two parts: one is the utilization relationship between nodes, and the other is the impact on the system after the node is conquered. We use the node… More >

  • Open Access

    ARTICLE

    Internet of Things Based Solutions for Transport Network Vulnerability Assessment in Intelligent Transportation Systems

    Weiwei Liu1, Yang Tang2, Fei Yang2, Chennan Zhang1, Dun Cao3, Gwang-jun Kim4, *

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2511-2527, 2020, DOI:10.32604/cmc.2020.09113

    Abstract Intelligent Transportation System (ITS) is essential for effective identification of vulnerable units in the transport network and its stable operation. Also, it is necessary to establish an urban transport network vulnerability assessment model with solutions based on Internet of Things (IoT). Previous research on vulnerability has no congestion effect on the peak time of urban road network. The cascading failure of links or nodes is presented by IoT monitoring system, which can collect data from a wireless sensor network in the transport environment. The IoT monitoring system collects wireless data via Vehicle-to-Infrastructure (V2I) channels to simulate key segments and their… More >

  • Open Access

    ABSTRACT

    Intravascular Ultrasound (IVUS)-Based Computational Modeling and Planar Biaxial Artery Material Properties for Human Coronary Plaque Vulnerability Assessment

    Mingchao Cai, Chun Yang, Mehmet H. Kural, Richard Bach, David Muccigrosso, Deshan Yang, Jie Zheng, Kristen L. Billiar, Dalin Tang

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.19, No.4, pp. 97-104, 2011, DOI:10.3970/icces.2011.019.097

    Abstract Image-based computational modeling has been introduced for vulnerable atherosclerotic plaques to identify critical mechanical conditions which may be used for better risk assessment and rupture predictions. In vivo patient-specific coronary plaque models are lagging due to limitations on non-invasive image resolution, flow data, and vessel material properties. We propose a procedure where intravascular ultrasound (IVUS) imaging, biaxial mechanical testing and computational modeling are combined together to acquire better and more complete plaque data and make more accurate plaque vulnerability assessment and predictions. More >

  • Open Access

    ARTICLE

    IVUS-Based Computational Modeling and Planar Biaxial Artery Material Properties for Human Coronary Plaque Vulnerability Assessment

    Molecular & Cellular Biomechanics, Vol.9, No.1, pp. 77-94, 2012, DOI:10.3970/mcb.2012.009.077

    Abstract Image-based computational modeling has been introduced for vulnerable atherosclerotic plaques to identify critical mechanical conditions which may be used for better plaque assessment and rupture predictions. In vivo patient-specific coronary plaque models are lagging due to limitations on non-invasive image resolution, flow data, and vessel material properties. A framework is proposed to combine intravascular ultrasound (IVUS) imaging, biaxial mechanical testing and computational modeling with fluid-structure interactions and anisotropic material properties to acquire better and more complete plaque data and make more accurate plaque vulnerability assessment and predictions. Impact of pre-shrink-stretch process, vessel curvature and high blood pressure on stress, strain,… More >

Displaying 1-10 on page 1 of 6. Per Page