Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (19)
  • Open Access

    PROCEEDINGS

    Automated Vulnerability Detection Using Deep Learning Technique

    Guan-Yan Yang1,*, Yi-Heng Ko1, Farn Wang1, Kuo-Hui Yeh2, Haw-Shiang Chang1, Hsueh Yi Chen1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.32, No.1, pp. 1-4, 2024, DOI:10.32604/icces.2024.013297

    Abstract 1 Introduction
    Ensuring the absence of exploitable vulnerabilities within applications has always been a critical aspect of software development [1-3]. Traditional code security testing methods often rely on manual inspection or rule-based approaches, which can be time-consuming and prone to human errors. With the recent advancements in natural language processing, deep learning has emerged as a viable approach for code security testing. In this work, we investigated the application of deep learning techniques to code security testing to enhance the efficiency and effectiveness of security analysis in the software development process. In 2022, Wartschinski et al.… More >

  • Open Access

    ARTICLE

    Software Vulnerability Mining and Analysis Based on Deep Learning

    Shibin Zhao*, Junhu Zhu, Jianshan Peng

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3263-3287, 2024, DOI:10.32604/cmc.2024.041949 - 15 August 2024

    Abstract In recent years, the rapid development of computer software has led to numerous security problems, particularly software vulnerabilities. These flaws can cause significant harm to users’ privacy and property. Current security defect detection technology relies on manual or professional reasoning, leading to missed detection and high false detection rates. Artificial intelligence technology has led to the development of neural network models based on machine learning or deep learning to intelligently mine holes, reducing missed alarms and false alarms. So, this project aims to study Java source code defect detection methods for defects like null pointer… More >

  • Open Access

    ARTICLE

    Influence of Confined Concrete Models on the Seismic Response of RC Frames

    Hüseyin Bilgin*, Bredli Plaku

    Structural Durability & Health Monitoring, Vol.18, No.3, pp. 197-222, 2024, DOI:10.32604/sdhm.2024.048645 - 15 May 2024

    Abstract In this study, the influence of confined concrete models on the response of reinforced concrete structures is investigated at member and global system levels. The commonly encountered concrete models such as Modified Kent-Park, Saatçioğlu-Razvi, and Mander are considered. Two moment-resisting frames designed according to the pre-modern code are taken into consideration to reflect the example of an RC moment-resisting frame in the current building stock. The building is in an earthquake-prone zone located on Z3 Soil Type. The inelastic response of the building frame is modelled by considering the plastic hinges formed on each beam… More >

  • Open Access

    ARTICLE

    Static Analysis Techniques for Fixing Software Defects in MPI-Based Parallel Programs

    Norah Abdullah Al-Johany1,*, Sanaa Abdullah Sharaf1,2, Fathy Elbouraey Eassa1,2, Reem Abdulaziz Alnanih1,2,*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3139-3173, 2024, DOI:10.32604/cmc.2024.047392 - 15 May 2024

    Abstract The Message Passing Interface (MPI) is a widely accepted standard for parallel computing on distributed memory systems. However, MPI implementations can contain defects that impact the reliability and performance of parallel applications. Detecting and correcting these defects is crucial, yet there is a lack of published models specifically designed for correcting MPI defects. To address this, we propose a model for detecting and correcting MPI defects (DC_MPI), which aims to detect and correct defects in various types of MPI communication, including blocking point-to-point (BPTP), nonblocking point-to-point (NBPTP), and collective communication (CC). The defects addressed by… More >

  • Open Access

    ARTICLE

    Three Dimensional Coupling between Elastic and Thermal Fields in the Static Analysis of Multilayered Composite Shells

    Salvatore Brischetto*, Roberto Torre, Domenico Cesare

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2551-2594, 2023, DOI:10.32604/cmes.2023.026312 - 09 March 2023

    Abstract This new work aims to develop a full coupled thermomechanical method including both the temperature profile and displacements as primary unknowns of the model. This generic full coupled 3D exact shell model permits the thermal stress investigation of laminated isotropic, composite and sandwich structures. Cylindrical and spherical panels, cylinders and plates are analyzed in orthogonal mixed curved reference coordinates. The 3D equilibrium relations and the 3D Fourier heat conduction equation for spherical shells are coupled and they trivially can be simplified in those for plates and cylindrical panels. The exponential matrix methodology is used to… More >

  • Open Access

    ARTICLE

    Static Analysis of Anisotropic Doubly-Curved Shell Subjected to Concentrated Loads Employing Higher Order Layer-Wise Theories

    Francesco Tornabene*, Matteo Viscoti, Rossana Dimitri

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.2, pp. 1393-1468, 2023, DOI:10.32604/cmes.2022.022237 - 31 August 2022

    Abstract In the present manuscript, a Layer-Wise (LW) generalized model is proposed for the linear static analysis of doublycurved shells constrained with general boundary conditions under the influence of concentrated and surface loads. The unknown field variable is modelled employing polynomials of various orders, each of them defined within each layer of the structure. As a particular case of the LW model, an Equivalent Single Layer (ESL) formulation is derived too. Different approaches are outlined for the assessment of external forces, as well as for non-conventional constraints. The doubly-curved shell is composed by superimposed generally anisotropic… More >

  • Open Access

    ARTICLE

    Static Analysis of Doubly-Curved Shell Structures of Smart Materials and Arbitrary Shape Subjected to General Loads Employing Higher Order Theories and Generalized Differential Quadrature Method

    Francesco Tornabene*, Matteo Viscoti, Rossana Dimitri

    CMES-Computer Modeling in Engineering & Sciences, Vol.133, No.3, pp. 719-798, 2022, DOI:10.32604/cmes.2022.022210 - 03 August 2022

    Abstract The article proposes an Equivalent Single Layer (ESL) formulation for the linear static analysis of arbitrarily-shaped shell structures subjected to general surface loads and boundary conditions. A parametrization of the physical domain is provided by employing a set of curvilinear principal coordinates. The generalized blending methodology accounts for a distortion of the structure so that disparate geometries can be considered. Each layer of the stacking sequence has an arbitrary orientation and is modelled as a generally anisotropic continuum. In addition, re-entrant auxetic three-dimensional honeycomb cells with soft-core behaviour are considered in the model. The unknown… More > Graphic Abstract

    Static Analysis of Doubly-Curved Shell Structures of Smart Materials and Arbitrary Shape Subjected to General Loads Employing Higher Order Theories and Generalized Differential Quadrature Method

  • Open Access

    ARTICLE

    Research on Known Vulnerability Detection Method Based on Firmware Analysis

    Wenjing Wang1, Tengteng Zhao1, Xiaolong Li1,*, Lei Huang1, Wei Zhang1, Hui Guo2

    Journal of Cyber Security, Vol.4, No.1, pp. 1-15, 2022, DOI:10.32604/jcs.2022.026816 - 05 May 2022

    Abstract At present, the network security situation is becoming more and more serious. Malicious network attacks such as computer viruses, Trojans and hacker attacks are becoming more and more rampant. National and group network attacks such as network information war and network terrorism have a serious damage to the production and life of the whole society. At the same time, with the rapid development of Internet of Things and the arrival of 5G era, IoT devices as an important part of industrial Internet system, have become an important target of infiltration attacks by hostile forces. This More >

  • Open Access

    ARTICLE

    Combinatorial Method with Static Analysis for Source Code Security in Web Applications

    Juan Ramón Bermejo Higuera1, Javier Bermejo Higuera1, Juan Antonio Sicilia Montalvo1, Tomás Sureda Riera2, Christopher I. Argyros3, Á. Alberto Magreñán4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.129, No.2, pp. 541-565, 2021, DOI:10.32604/cmes.2021.017213 - 08 October 2021

    Abstract Security weaknesses in web applications deployed in cloud architectures can seriously affect its data confidentiality and integrity. The construction of the procedure utilized in the static analysis tools of source code security differs and therefore each tool finds a different number of each weakness type for which it is designed. To utilize the possible synergies different static analysis tools may process, this work uses a new method to combine several source codes aiming to investigate how to increase the performance of security weakness detection while reducing the number of false positives. Specifically, five static analysis More >

  • Open Access

    ARTICLE

    Static and Dynamic Analyses of Spliced Column

    Deepak Kumar Singh*

    Sound & Vibration, Vol.55, No.3, pp. 253-262, 2021, DOI:10.32604/sv.2021.011627 - 15 July 2021

    Abstract The analysis of spliced column has been carried out to detect optimum location of providing splices in the column. In the present work, static and dynamic (free vibration) analyses of spliced column have been done by randomising the location of splicing. A symmetrical four storey steel framed building has been modelled, analysed and designed for loads (dead, live and earthquake loads) recommended by Indian Codal provisions using Staad.Pro. The critical column at each floor level is identified based on axial force (AF), bending moment (BM) and shear force (SF). The total 16 models of spliced… More >

Displaying 1-10 on page 1 of 19. Per Page