Treffer 1 - 20 von 34.625

1

Java Platform Security: a Behavioral Model for Speculative Execution Vulnerabilities
Parekh, Shikha
2025 International Conference on Intelligent Communication Networks and Computational Techniques (ICICNCT) Intelligent Communication Networks and Computational Techniques (ICICNCT), 2025 International Conference on. :1-7 Sep, 2025

Konferenz
3

Large Language Model-Guided Detection of Java Fileless Webshells via Bytecode Instrumentation
Shuhao, Liu ; Yijun, Liu ; Pei, Guo ; et al.
2025 22nd International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP) Wavelet Active Media Technology and Information Processing (ICCWAMTIP), 2025 22nd International Computer Conference on. :1-5 Dec, 2025

Konferenz
4

An Investigation into Misuse of Java Security APIs by Large Language Models
Zahra Mousavi ; Chadni Islam ; Kristen Moore ; et al.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security. :1299-1315

FOS: Computer and inform... Computer Science - Compu... Computer Science - Crypt... Computer Science - Compu... Computers and Society (c... Cryptography and Securit...
Fachzeitschrift
5

An Investigation into Misuse of Java Security APIs by Large Language Models
Mousavi, Zahra ; Islam, Chadni ; Moore, Kristen ; et al.

Computer Science - Crypt... Computer Science - Compu... Computer Science - Compu...
Report
6

Symmaries: Automatic Inference of Formal Security Summaries for Java Programs
Khakpour, Narges ; Berthier, Nicolas

Cryptography and Securit... Formal Languages and Aut... Programming Languages Software Engineering
Report
7

Uncovering Hidden Inclusions of Vulnerable Dependencies in Real-World Java Projects
Schott, Stefan ; Ponta, Serena Elisa ; Fischer, Wolfram ; et al.

Software Engineering Cryptography and Securit...
Report
8

Bytecode-centric Detection of Known-to-be-vulnerable Dependencies in Java Projects
Schott, Stefan ; Ponta, Serena Elisa ; Fischer, Wolfram ; et al.

Software Engineering Cryptography and Securit...
Report
10

Classport: Designing Runtime Dependency Introspection for Java
Cofano, Serena ; Williams, Daniel ; Sharma, Aman ; et al.

Software Engineering Cryptography and Securit...
Report
11

Maven-Lockfile: High Integrity Rebuild of Past Java Releases
Schmid, Larissa ; Lundell, Elias ; Gamage, Yogya ; et al.

Software Engineering Cryptography and Securit...
Report
12

DALEQ -- Explainable Equivalence for Java Bytecode
Dietrich, Jens ; Hassanshahi, Behnaz

Cryptography and Securit...
Report
14

Concurrent Programs, Finalizers and Cleaners in Java - Security Problems
Jerzy Krawiec ; Piotr Gorny ; Maciej Kiedrowicz
Communications in Computer and Information Science ISBN: 9783031628429

Buch
15

Exploring unconventional food plants used by local communities in a rural area of West Java, Indonesia: ethnobotanical assessment, use trends, and potential for improved nutrition.
Rahayu YYS ; Sujarwo W ; Irsyam ASD ; et al.
Publisher: Biomed Central Country of Publication: England NLM ID: 101245794 Publication Model: Electronic Cited Medium: Internet ISSN: 1746-4269 (Electronic) Linking ISSN: 17464269 NLM ISO Abbreviation: J Ethnobiol Ethnomed Subsets: MEDLINE

Indonesia Interviews as Topic stat... Cross-Sectional Studies Humans Female Adolescent
Fachzeitschrift
16

Detecting Security Patches in Java Projects Using NLP Technology
Andrea Stefanoni ; Šarūnas Girdzijauskas ; Christina Jenkins ; et al.

Natural Language Process... Security Code analysis Java Transformer LSTM
Konferenz
17

Practical Bootcamp JWT authentication with Java and SpringBoot
API security: JWT & SpringBoot

Packt Publishing, publisher, production company. ; Pandey, Ranjan, speaker, instructor.

Video
19

CHERI JNI : Sinking the Java Security Model into the C
Chisnall, David ; Davis, Brooks ; Gudka, Khilan ; et al.
Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems. :569-583

Konferenz
20

Taxonomy of Security Weaknesses in Java and Kotlin Android Apps
Mazuera-Rozo, Alejandro ; Escobar-Velásquez, Camilo ; Espitia-Acero, Juan ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report

Filter