In this article the authors give a consideration to a problem of detecting errors and vulnerabilities in software components of different digital devices. The article shows an ever-increasing criticality of this problem in the course of time related to development of modern concepts the Industrial Internet and the Industry 4.0. It gives an overview of modern approaches to application of methods of computer-assisted learning and artificial intellect in the sphere of cyber security, problems and prospects of application thereof. A new approach is offered to searching software vulnerabilities on the basis of application of deep learning. The approach is based on building semantically significant vector representations of software code and mult...
The identification of vulnerabilities is an important element of the software development process to...
Application of deep learning to enhance the accuracy of intrusion detection in modern computer netwo...
Due to the continuous digitalization of our society, distributed and web-based applications become o...
In this article the authors give a consideration to a problem of detecting errors and vulnerabilitie...
In recent years, with the rise of Internet technology, software vulnerabilities have also flooded, m...
Open source software has been widely used in various industries due to its openness and flexibility,...
This survey paper describes a literature review of deep learning (DL) methods for cyber security app...
Recent years have seen the successful application of deep learning techniques, an enhanced model of ...
The object of research of this work is the methods of deep learning for source code vulnerability de...
With the development of information technology, thousands of devices are connected to the Internet, ...
The object of research of this work is the methods of deep learning for source code vulnerability de...
Abstract The frequency of cyber attacks has been rising rapidly lately, which is a major concern. Be...
One of the most important challenges in the field of a software code audit is the presence of vulner...
People in the modern era spend most of their lives in virtual environments that offer a range of pub...
A cyber-physical system (CPS) integrates various interconnected physical processes, computing resour...
The identification of vulnerabilities is an important element of the software development process to...
Application of deep learning to enhance the accuracy of intrusion detection in modern computer netwo...
Due to the continuous digitalization of our society, distributed and web-based applications become o...
In this article the authors give a consideration to a problem of detecting errors and vulnerabilitie...
In recent years, with the rise of Internet technology, software vulnerabilities have also flooded, m...
Open source software has been widely used in various industries due to its openness and flexibility,...
This survey paper describes a literature review of deep learning (DL) methods for cyber security app...
Recent years have seen the successful application of deep learning techniques, an enhanced model of ...
The object of research of this work is the methods of deep learning for source code vulnerability de...
With the development of information technology, thousands of devices are connected to the Internet, ...
The object of research of this work is the methods of deep learning for source code vulnerability de...
Abstract The frequency of cyber attacks has been rising rapidly lately, which is a major concern. Be...
One of the most important challenges in the field of a software code audit is the presence of vulner...
People in the modern era spend most of their lives in virtual environments that offer a range of pub...
A cyber-physical system (CPS) integrates various interconnected physical processes, computing resour...
The identification of vulnerabilities is an important element of the software development process to...
Application of deep learning to enhance the accuracy of intrusion detection in modern computer netwo...
Due to the continuous digitalization of our society, distributed and web-based applications become o...