Jin-jun TAN
YOU?
Author Swipe
View article: A Survey of the Key Technology of Software Vulnerability Mining
A Survey of the Key Technology of Software Vulnerability Mining Open
In the current cyberspace, vulnerability has attracted the widespread attention. This paper briefly introduces the typical software vulnerability mining techniques. Based on the existing research work, this paper puts forward the whole ide…
View article: Patching Power System Software Vulnerability Using CNNVD
Patching Power System Software Vulnerability Using CNNVD Open
Both the attractiveness of power systems as targets of cyberattack and their vulnerability to remote attack via digital networks are evident from recent world events. Vulnerabilities in software represent a serious risk for power systems. …