Sciweavers

499 search results - page 9 / 100
» A Study on Latent Vulnerabilities
Sort
View
IJCNLP
2004
Springer
15 years 2 months ago
A Study of Semi-discrete Matrix Decomposition for LSI in Automated Text Categorization
Abstract. This paper proposes the use of Latent Semantic Indexing (LSI) techniques, decomposed with semi-discrete matrix decomposition (SDD) method, for text categorization. The SD...
Qiang Wang, Xiaolong Wang, Guan Yi
FLAIRS
2008
14 years 11 months ago
Using Latent Semantic Analysis to Explore Second Language Lexical Development
This study explores how Latent Semantic Analysis (LSA) can be used as a method to examine the lexical development of second language (L2) speakers. This year long longitudinal stu...
Scott A. Crossley, Thomas L. Salsbury, Philip M. M...
ICSM
2003
IEEE
15 years 2 months ago
Characterizing the 'Security Vulnerability Likelihood' of Software Functions
Software maintainers and auditors would benefit from a tool to help them focus their attention on functions that are likely to be the source of security vulnerabilities. However,...
Dan DaCosta, Christopher Dahn, Spiros Mancoridis, ...
DSN
2008
IEEE
14 years 11 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
IEEEARES
2010
IEEE
15 years 1 months ago
Configuration Fuzzing for Software Vulnerability Detection
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environ...
Huning Dai, Christian Murphy, Gail E. Kaiser