About JJCIT
Contact
Submit an Article
Login
ISSN 2415-1076 (online) / ISSN 2413-9351 (print)
Home
Journal Boards
Call for Papers
Instructions for Authors
Submission
Call for SI
Archives
NEWS
Call for Papers (CFP): Special Issue on Applications of Generative AI
Home
/
Search for: Vulnerability
EFFICIENT DEEP FEATURES LEARNING FOR VULNERABILITY DETECTION USING CHARACTER N- GRAM EMBEDDING
(Received: 19-Aug.-2020, Revised: 2-Oct.-2020 and 28-Oct.-2020 , Accepted: 5-Nov.-2020)
Mamdouh Alenezi,Mohammed Zagane,Yasir Javed
#Software security
#Vulnerability detection
#Deep features learning
#Character N-gram embedding
Views
: 3693
Downloads
: 959
DOI
: 10.5455/jjcit.71-1597824949
Cited by
: 9
Abstract
SEMI-QUANTITATIVE SECURITY RISK ASSESSMENT OF ROBOTIC SYSTEMS
(Received: 2018-08-28, Revised: 2018-11-05 , Accepted: 2018-11-15)
Anas AlMajali,Khalil M. Ahmad Yousef,Bassam J. Mohd1,Waleed Dweik,Salah Abu Ghalyon,Roa’a Hasan
#Cyber-physical security
#Robot
#Availability
#Threats
#Attacks
#Vulnerability
#Risk
#Risk assessment
#Mitigation
#PeopleBot.
Views
: 3970
Downloads
: 977
DOI
: 10.5455/jjcit.71-1535447790
Cited by
: 8
Abstract
AN EFFICIENT TWO-SERVER AUTHENTICATION AND KEY EXCHANGE PROTOCOL FOR ACCESSING SECURE CLOUD SERVICES
(Received: 2017-12-14, Revised: 2018-02-13 , Accepted: 2018-02-28)
Durbadal Chattaraj,Monalisa Sarma,Debasis Samanta
#Key agreement
#Authentication protocol
#User privacy
#Cloud data security
#Privacy-preserving protocol.
Views
: 3577
Downloads
: 1140
DOI
: 10.5455/jjcit.71-1513237171
Cited by
: 4
Abstract
No More Papers
Aims & Scope
Editorial Board
Publishing Schedule
Open Access Policy
Peer-Review Process
Publication Ethics and Malpractice Statement
Copyright and Access
Publisher, Management and Funding
JJCIT is indexed in
Scopus
ESCI
DOAJ
CrossRef
BASE
ACADEMIA
WorldCat
Google Scholar
ScienceGate
Get monthly updates and free resources
Subscribe