Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    REVIEW

    A Survey on Sensor- and Communication-Based Issues of Autonomous UAVs

    Pavlo Mykytyn1,2,*, Marcin Brzozowski1, Zoya Dyka1,2, Peter Langendoerfer1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1019-1050, 2024, DOI:10.32604/cmes.2023.029075 - 17 November 2023

    Abstract The application field for Unmanned Aerial Vehicle (UAV) technology and its adoption rate have been increasing steadily in the past years. Decreasing cost of commercial drones has enabled their use at a scale broader than ever before. However, increasing the complexity of UAVs and decreasing the cost, both contribute to a lack of implemented security measures and raise new security and safety concerns. For instance, the issue of implausible or tampered UAV sensor measurements is barely addressed in the current research literature and thus, requires more attention from the research community. The goal of this… More >

  • Open Access

    ARTICLE

    A Cross Language Code Security Audit Framework Based on Normalized Representation

    Yong Chen1,*, Chao Xu1, Jing Selena He2, Sheng Xiao3

    Journal of Quantum Computing, Vol.4, No.2, pp. 75-84, 2022, DOI:10.32604/jqc.2022.031312 - 16 May 2023

    Abstract With the rapid development of information technology, audit objects and audit itself are more and more inseparable from software. As an important means of software security audit, code security audit will become an important aspect of future audit that cannot be ignored. However, the existing code security audit is mainly based on source code, which is difficult to meet the audit needs of more and more programming languages and binary commercial software. Based on the idea of normalized transformation, this paper constructs a cross language code security audit framework (CLCSA). CLCSA first uses compile/decompile technology… More >

  • Open Access

    ARTICLE

    Benchmarking Approach to Compare Web Applications Static Analysis Tools Detecting OWASP Top Ten Security Vulnerabilities

    Juan R. Bermejo Higuera1, *, Javier Bermejo Higuera1, Juan A. Sicilia Montalvo1, Javier Cubo Villalba1, Juan José Nombela Pérez1

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1555-1577, 2020, DOI:10.32604/cmc.2020.010885 - 30 June 2020

    Abstract To detect security vulnerabilities in a web application, the security analyst must choose the best performance Security Analysis Static Tool (SAST) in terms of discovering the greatest number of security vulnerabilities as possible. To compare static analysis tools for web applications, an adapted benchmark to the vulnerability categories included in the known standard Open Web Application Security Project (OWASP) Top Ten project is required. The information of the security effectiveness of a commercial static analysis tool is not usually a publicly accessible research and the state of the art on static security tool analyzers shows… More >

Displaying 1-10 on page 1 of 3. Per Page