Treffer 1 - 20 von 3.838

1

Dependency Network Structure and Security Vulnerabilities in Software Supply Chains.
Yoo, Eunae ; Craighead, Christopher W. ; Samtani, Sagar
Journal of Management Information Systems. 2025, Vol. 42 Issue 4, p1149-1176. 28p.

COMPUTER security vulner... SUPPLY chains STATISTICAL correlation COMPUTER software develo... COMPUTATIONAL complexity
Fachzeitschrift
Zu den Favoriten
2

Balancing Secrecy and Transparency in Bug Bounty Programs.
Telang, Rahul ; Hydari, Muhammad Zia
Communications of the ACM. Aug2025, Vol. 68 Issue 8, p20-23. 4p.

COMPUTER hackers COMPUTER security vulner... ORGANIZATIONAL transpare... COMPUTER ethics INTERNET security COMPUTER security laws
Zeitschrift
Zu den Favoriten
3

Stop Using Vulnerability Counts to Measure Software Security.
Meneely, Andy ; Keller, Brandon
Communications of the ACM. Sep2025, Vol. 68 Issue 9, p34-36. 3p.

COMPUTER security vulner... CORPORATE culture COMPUTER software securi... SOFTWARE measurement SOFTWARE architecture INTERNET security
Zeitschrift
Zu den Favoriten
4

Vulnerability Counts: A Rejoinder.
Communications of the ACM. Dec2025, Vol. 68 Issue 12, p7-7. 1p.

COMPUTER security vulner... COMPUTER security DATA security failures
Zeitschrift
Zu den Favoriten
5

Cyber Vulnerabilities at Large US Financial Institutions and Their Third-Party Service Providers.
Jin-Wook Chang ; Dice, Jacob ; Shengwu Du ; et al.
Working Papers: U.S. Federal Reserve Board's Finance & Economic Discussion Series. Nov2025, p1-29. 29p.

COMPUTER security vulner... FINANCIAL institutions NONBANK financial instit... INFORMATION technology m... CYBERTERRORISM CONTRACTING out
Report
Zu den Favoriten
6

TOWARD GREATER DIGITAL HYGIENE: Industry experts weigh in on the increasing need to keep aerospace and defense manufacturers-and our country-safe from cyberattacks.
Hanson, Kip
Manufacturing Engineering. Nov2025, Vol. 175 Issue 4, Special section p50-54. 5p.

CYBERTERRORISM COMPUTER security vulner... SECURITY management MANUFACTURING industries INTERNET security AEROSPACE engineering
Zeitschrift
Zu den Favoriten
7

Defect-scanner: a comparative empirical study on language model and deep learning approach for software vulnerability detection.
Pham, Van-Hau ; Hien, Do Thi Thu ; Hoang, Hien Do ; et al.
International Journal of Information Security. Dec2024, Vol. 23 Issue 6, p3513-3526. 14p.

COMPUTER security vulner... PROGRAMMING languages NATURAL language process... LANGUAGE models COMPUTER software securi... SOURCE code
Fachzeitschrift
Zu den Favoriten
8

Fifty Years of Open Source Software Supply-Chain Security.
Cox, Russ
Communications of the ACM. Oct2025, Vol. 68 Issue 10, p88-95. 8p.

OPEN source software COMPUTER security vulner... COMPUTER software securi... KERNEL operating systems HONEYWELL International...
Zeitschrift
Zu den Favoriten
9

Unique explainable federated learning approach for detecting model poisoning attacks to secure systems.
Fizan, Muhmmad ; Awad Abdellatif, Alaa ; Asad, Muhammad ; et al.
Cluster Computing. Dec2025, Vol. 28 Issue 16, p1-15. 15p.

FEDERATED learning COMPUTER security vulner... ARTIFICIAL intelligence
Fachzeitschrift
Zu den Favoriten
10

Mission Aware Cyber‐Physical Security.
Bakirtzis, Georgios ; Carter, Bryan ; Fleming, Cody H. ; et al.
Systems Engineering. Dec2025, p1. 14p. 6 Illustrations.

INTERNET security COMPUTER security vulner... CYBERTERRORISM GOAL (Psychology) STABILITY of linear syst... SYSTEMS engineering
Fachzeitschrift
Zu den Favoriten
11

On the Security and Efficiency of TLS 1.3 Handshake with Hybrid Key Exchange from CPA-Secure KEMs.
Chen, Jinrong ; Peng, Wei ; Wang, Yi ; et al.
Entropy. Dec2025, Vol. 27 Issue 12, p1242. 28p.

CRYPTOGRAPHY COMPUTER security vulner... RESEARCH evaluation
Fachzeitschrift
Zu den Favoriten
12

Securing Library Systems: Cybersecurity Best Practices for Public Libraries.
Daghita, David ; Lipkowitz, Scott
Public Library Quarterly. Nov2025, p1-9. 9p.

PUBLIC libraries COMPUTER security vulner... SECURITY systems INTERNET security INTEGRATED library syste...
Fachzeitschrift
Zu den Favoriten
13

When AI Is Fooled: Hidden Risks in LLM-Assisted Grading.
Milani, Alfredo ; Franzoni, Valentina ; Florindi, Emanuele ; et al.
Education Sciences. Nov2025, Vol. 15 Issue 11, p1419. 18p.

Artificial intelligence Educational evaluation Grading of students Evaluation methodology Language models Computer security vulner...
Fachzeitschrift
Zu den Favoriten
14

MinRS: A defense method for both model availability and model privacy.
REN, Zhiqiang ; CHEN, Xuebin ; ZHANG, Hongyang
Computer Engineering & Science / Jisuanji Gongcheng yu Kexue. Nov2025, Vol. 47 Issue 11, p1974-1983. 10p.

FEDERATED learning COMPUTER security vulner... ACCESS control SECURITY systems
Fachzeitschrift
Zu den Favoriten
15

SOFTWARE TORTS AND SOFTWARE CONTRACTS: REFRAMING THE DEVELOPER'S DUTY.
MUSSER, MICAH R.
New York University Law Review. Nov2025, Vol. 100 Issue 5, p1666-1710. 45p.

COMPUTER security vulner... TORTS COMPUTER programmers DAMAGES (Law) NEGLIGENCE TORT reform
Fachzeitschrift
Zu den Favoriten
16

Research Initiative for Safe AI Use from a Security Perspective.
Shibahara, Toshiki
NTT Technical Review. Nov2025, Vol. 23 Issue 11, p54-58. 5p.

LANGUAGE models COMPUTER security vulner... SECURITY systems LABORATORIES RESEARCH & development p... AUTOMATION software
Fachzeitschrift
Zu den Favoriten
17

OpenAI says prompt injections that can trick AI browsers like ChatGPT Atlas may never be fully 'solved'—experts say risks are 'a feature not a bug'.
Nolan, Beatrice
Fortune.com. 12/24/2025, pN.PAG-N.PAG. 1p.

INFORMATION technology s... COMPUTER security vulner... CYBERTERRORISM INTELLIGENT personal ass... OPENAI Inc.
Zeitschrift
Zu den Favoriten
18

AI coding tools exploded in 2025. The first security exploits show what could go wrong.
Lazzaro, Sage
Fortune.com. 12/16/2025, pN.PAG-N.PAG. 1p.

COMPUTER security vulner... COMPUTER software develo... CYBERTERRORISM SECURITY systems COMPUTER software securi... CODE generators
Zeitschrift
Zu den Favoriten
19

AI reasoning models that can 'think' are more vulnerable to jailbreak attacks, new research suggests.
Nolan, Beatrice
Fortune.com. 11/8/2025, pN.PAG-N.PAG. 1p.

COMPUTER security vulner... SAFETY standards RISK assessment LOGIC UNIVERSITY research MACHINE learning
Zeitschrift
Zu den Favoriten
20

How Exploits Impact Computer Science Theory.
Bratus, Sergey
Communications of the ACM. Dec2024, Vol. 67 Issue 12, p86-86. 1p.

COMPUTER security vulner... COMPUTER science COMPUTER architecture COMPUTER performance
Zeitschrift
Zu den Favoriten

Filter