Skip Content
You are currently on the new version of our website. Access the old version .

56 Results Found

  • Article
  • Open Access
34 Citations
14,563 Views
24 Pages

On Combining Static, Dynamic and Interactive Analysis Security Testing Tools to Improve OWASP Top Ten Security Vulnerability Detection in Web Applications

  • Francesc Mateo Tudela,
  • Juan-Ramón Bermejo Higuera,
  • Javier Bermejo Higuera,
  • Juan-Antonio Sicilia Montalvo and
  • Michael I. Argyros

20 December 2020

The design of the techniques and algorithms used by the static, dynamic and interactive security testing tools differ. Therefore, each tool detects to a greater or lesser extent each type of vulnerability for which they are designed for. In addition,...

  • Article
  • Open Access
1 Citations
2,469 Views
19 Pages

TeeDFuzzer: Fuzzing Trusted Execution Environment

  • Sheng Wen,
  • Liam Xu,
  • Liwei Tian,
  • Suping Liu and
  • Yong Ding

The Trusted Execution Environment (TEE) is crucial for safeguarding the ecosystem of embedded systems. It uses isolation to minimize the TCB (Trusted Computing Base) and protect sensitive software. It is vital because devices handle vast, potentially...

  • Article
  • Open Access
3 Citations
3,163 Views
12 Pages

28 November 2023

Static analysis is a software testing technique that analyzes the code without executing it. It is widely used to detect vulnerabilities, errors, and other issues during software development. Many tools are available for static analysis of Java code,...

  • Article
  • Open Access
41 Citations
11,642 Views
16 Pages

AndroShield: Automated Android Applications Vulnerability Detection, a Hybrid Static and Dynamic Analysis Approach

  • Amr Amin,
  • Amgad Eldessouki,
  • Menna Tullah Magdy,
  • Nouran Abdeen,
  • Hanan Hindy and
  • Islam Hegazy

22 October 2019

The security of mobile applications has become a major research field which is associated with a lot of challenges. The high rate of developing mobile applications has resulted in less secure applications. This is due to what is called the “rus...

  • Article
  • Open Access
6 Citations
7,609 Views
33 Pages

19 September 2023

The increasing complexity of web applications and systems, driven by ongoing digitalization, has made software security testing a necessary and critical activity in the software development lifecycle. This article compares the performance of open-sou...

  • Article
  • Open Access
19 Citations
4,387 Views
33 Pages

29 January 2022

Established Internet of Things (IoT) platforms suffer from their inability to determine whether an IoT app is secure or not. A security analysis system (SAS) is a protective shield against any attack that breaks down data privacy and security. Its ma...

  • Article
  • Open Access
4 Citations
3,198 Views
23 Pages

5 August 2024

The advent of blockchain technology has revolutionized various sectors by providing transparency, immutability, and automation. Central to this revolution are smart contracts, which facilitate trustless and automated transactions across diverse domai...

  • Article
  • Open Access
1,003 Views
20 Pages

Towards Efficient and Accurate Network Exposure Surface Analysis for Enterprise Networks

  • Zhihua Wang,
  • Minghui Jin,
  • Youlin Hu,
  • Dacheng Shan,
  • Lizhao You and
  • Peijun Chen

Network exposure surface analysis aims to identify network assets that are exposed to the Internet and is critical for enterprise security. However, existing tools face two key challenges: combinatorial explosion in traditional packet testing, and hi...

  • Feature Paper
  • Article
  • Open Access
3 Citations
3,293 Views
19 Pages

A Novel Static Analysis Approach Using System Calls for Linux IoT Malware Detection

  • Jayanthi Ramamoorthy,
  • Khushi Gupta,
  • Ram C. Kafle,
  • Narasimha K. Shashidhar and
  • Cihan Varol

The proliferation of Internet of Things (IoT) devices on Linux platforms has heightened concerns regarding vulnerability to malware attacks. This paper introduces a novel approach to investigating the behavior of Linux IoT malware by examining syscal...

  • Article
  • Open Access
4 Citations
3,128 Views
25 Pages

The agricultural front-end loader is an implement attached to the front of tractors to transport various agricultural materials, including soil. Since they are subjected to various loads due to the working environment, their safety analysis in consid...

  • Article
  • Open Access
42 Citations
8,055 Views
14 Pages

Instruction2vec: Efficient Preprocessor of Assembly Code to Detect Software Weakness with CNN

  • Yongjun Lee,
  • Hyun Kwon,
  • Sang-Hoon Choi,
  • Seung-Ho Lim,
  • Sung Hoon Baek and
  • Ki-Woong Park

30 September 2019

Potential software weakness, which can lead to exploitable security vulnerabilities, continues to pose a risk to computer systems. According to Common Vulnerability and Exposures, 14,714 vulnerabilities were reported in 2017, more than twice the numb...

  • Communication
  • Open Access
2 Citations
3,353 Views
12 Pages

Structural Design and Safety Verification of a Service Hatch Used at Airports by FEM Analysis

  • Jakub Fiačan,
  • Jozef Jenis,
  • Damián Čechmánek,
  • Slavomír Hrček and
  • Pavol Michal

This paper examines the design of a maintenance shaft hatch cover at an airport service road which will be utilized at airports in the European Union. The shaft has a particular application: it will be used for information networks and airport securi...

  • Article
  • Open Access
34 Citations
5,909 Views
24 Pages

23 August 2018

As one important means of ensuring secure operation in a power system, the contingency selection and ranking methods need to be more rapid and accurate. A novel method-based least absolute shrinkage and selection operator (Lasso) algorithm is propose...

  • Article
  • Open Access
5 Citations
3,596 Views
13 Pages

Optimizing IoT Web Fuzzing by Firmware Infomation Mining

  • Yifei Gao,
  • Xu Zhou,
  • Wei Xie,
  • Baosheng Wang,
  • Enze Wang and
  • Zhenhua Wang

24 June 2022

IoT web fuzzing is an effective way to detect security flaws in IoT devices. However, without enough information of the tested targets, IoT web fuzzing is often blind and inefficient. In this paper, we propose to use static analysis to assist IoT web...

  • Article
  • Open Access
600 Views
21 Pages

The proliferation of binary vulnerabilities in the software supply chain has become a critical security challenge. Existing vulnerability detection approaches—including dynamic analysis, static analysis, and decompilation-assisted analysis&mdas...

  • Article
  • Open Access
5 Citations
2,310 Views
26 Pages

11 March 2023

During the excavation of underground projects, the rock masses left as the bearing support system are also subjected to dynamic loads from the excavation activities ahead. These rock masses have been damaged and fractured during the initial exposure...

  • Article
  • Open Access
18 Citations
3,445 Views
14 Pages

Loading Rate and Temperature Interaction Effects on the Mode I Fracture Response of a Ductile Polyurethane Adhesive Used in the Automotive Industry

  • Mael Perez,
  • Alireza Akhavan-Safar,
  • Ricardo J. C. Carbas,
  • Eduardo A. S. Marques,
  • Sabine Wenig and
  • Lucas F. M. da Silva

14 December 2022

Due to their high elongation at failure and damping capacity, polyurethanes are one of the main types of adhesives used in automotive structures. However, despite the wide range of applications of adhesives, their fracture mechanics behavior is still...

  • Feature Paper
  • Article
  • Open Access
3,859 Views
17 Pages

Determining the Safest Anchoring Knot in a Fall Arrest System by Means of Static Tests

  • Pedro Ignacio Sáez,
  • Elena Ángela Carrión,
  • Belén Ferrer,
  • Encarnación García and
  • Juan Francisco Monge

31 January 2024

Today, rope access systems (RASs) and fall arrest systems (FASs) incorporate significant technological innovations. This research aims to determine the safest knot to be used in RASs. The most secure knots are those that leave the most resistance in...

  • Article
  • Open Access
26 Citations
5,263 Views
26 Pages

Efficient Feature Selection for Static Analysis Vulnerability Prediction

  • Katarzyna Filus,
  • Paweł Boryszko,
  • Joanna Domańska,
  • Miltiadis Siavvas and
  • Erol Gelenbe

6 February 2021

Common software vulnerabilities can result in severe security breaches, financial losses, and reputation deterioration and require research effort to improve software security. The acceleration of the software production cycle, limited testing resour...

  • Article
  • Open Access
4 Citations
4,599 Views
25 Pages

22 November 2022

Since a large number of Linux kernel vulnerabilities are discovered every year, many vulnerabilities cannot be patched in time. Security vendors often prioritize patching high-risk vulnerabilities, and the ratings of vulnerabilities need to be evalua...

  • Article
  • Open Access
5 Citations
3,125 Views
14 Pages

A Modified FlowDroid Based on Chi-Square Test of Permissions

  • Hongzhaoning Kang,
  • Gang Liu,
  • Zhengping Wu,
  • Yumin Tian and
  • Lizhi Zhang

30 January 2021

Android devices are currently widely used in many fields, such as automatic control, embedded systems, the Internet of Things and so on. At the same time, Android applications (apps) always use multiple permissions, and permissions can be abused by m...

  • Article
  • Open Access
6 Citations
2,416 Views
17 Pages

19 December 2022

With the rapid expansion of new energy in China, the large-scale grid connection of new energy is increasing, and the operating safety of the new energy power system is being put to the test. The static security and stability region (SSSR) with hyper...

  • Article
  • Open Access
3 Citations
1,920 Views
28 Pages

A Hardware Security Protection Method for Conditional Branches of Embedded Systems

  • Qiang Hao,
  • Dongdong Xu,
  • Yusen Qin,
  • Ruyin Li,
  • Zongxuan Zhang,
  • Yunyan You and
  • Xiang Wang

The branch prediction units (BPUs) generally have security vulnerabilities, which can be used by attackers to tamper with the branches, and the existing protection methods cannot defend against these attacks. Therefore, this article proposes a hardwa...

  • Article
  • Open Access
378 Views
25 Pages

8 January 2026

This study proposes a robust chaotic encryption framework based on a Fuzzy Rule-Based Sugeno Inference (FRBSI) system, integrated with high-level security analyses. The algorithm employs a dynamic mixture of Lorenz chaotic state variables, which are...

  • Article
  • Open Access
303 Views
19 Pages

24 December 2025

Overhead transmission lines often suffer from mutual collisions between adjacent conductors in windy weather, which can cause power failures to villages. To solve this problem, this paper introduces a spacer ring and a teleoperated robot for the inst...

  • Article
  • Open Access
19 Citations
4,305 Views
17 Pages

Detection of Android Malware in the Internet of Things through the K-Nearest Neighbor Algorithm

  • Himanshi Babbar,
  • Shalli Rani,
  • Dipak Kumar Sah,
  • Salman A. AlQahtani and
  • Ali Kashif Bashir

18 August 2023

Predicting attacks in Android malware devices using machine learning for recommender systems-based IoT can be a challenging task. However, it is possible to use various machine-learning techniques to achieve this goal. An internet-based framework is...

  • Article
  • Open Access
2 Citations
2,117 Views
16 Pages

Evaluation of Static Displacement Based on Ambient Vibration for Bridge Safety Management

  • Sang-Hyuk Oh,
  • Hyun-Joong Kim,
  • Kwan-Soo Park and
  • Jeong-Dae Kim

11 October 2024

The evaluation of bridge safety is closely related to structural stiffness, with dynamic characteristics and displacement being key indicators. Displacement is a significant factor as it is a physical phenomenon that bridge users can directly perceiv...

  • Article
  • Open Access
8 Citations
3,306 Views
16 Pages

LPWAN Key Exchange: A Centralised Lightweight Approach

  • Gaurav Pathak,
  • Jairo Gutierrez,
  • Akbar Ghobakhlou and
  • Saeed Ur Rehman

5 July 2022

The Internet of Things (IoT) is one of the fastest emerging technologies in the industry. It includes diverse applications with different requirements to provide services to users. Secure, low-powered, and long-range transmissions are some of the mos...

  • Article
  • Open Access
1 Citations
1,500 Views
23 Pages

Benchmarking Static Analysis for PHP Applications Security

  • Jiazhen Zhao,
  • Kailong Zhu,
  • Canju Lu,
  • Jun Zhao and
  • Yuliang Lu

3 September 2025

PHP is the most widely used server-side programming language, but it remains highly susceptible to diverse classes of vulnerabilities. Static Application Security Testing (SAST) tools are commonly adopted for vulnerability detection; however, their e...

  • Article
  • Open Access
1,402 Views
23 Pages

1 September 2025

Laminated glass (LG) composite systems are increasingly being utilized in architectural and security applications due to their enhanced strength and safety features. Understanding the structural response of LG systems is crucial for optimizing their...

  • Article
  • Open Access
10 Citations
4,576 Views
14 Pages

Investigation of the Pull-Out Behaviour of Metal Threaded Inserts in Thermoplastic Fused-Layer Modelling (FLM) Components

  • Tobias Kastner,
  • Juliane Troschitz,
  • Christian Vogel,
  • Thomas Behnisch,
  • Maik Gude and
  • Niels Modler

To provide detachable, secure and long-term stable joints in fused-layer modelling (FLM) components or assemblies, metal threaded inserts are widely used as extrinsic interfaces. However, the load-bearing capacity of such inserts is influenced by the...

  • Article
  • Open Access
1 Citations
895 Views
15 Pages

9 July 2025

The Internet of Drones (IoD) overcomes the physical limitations of traditional ground networks with its dynamic topology and 3D spatial flexibility, playing a crucial role in various fields. However, eavesdropping and spoofing attacks in open channel...

  • Article
  • Open Access
1,867 Views
20 Pages

JITScanner: Just-in-Time Executable Page Check in the Linux Operating System

  • Pasquale Caporaso,
  • Giuseppe Bianchi and
  • Francesco Quaglia

26 February 2024

Modern malware poses a severe threat to cybersecurity, continually evolving in sophistication. To combat this threat, researchers and security professionals continuously explore advanced techniques for malware detection and analysis. Dynamic analysis...

  • Article
  • Open Access
8 Citations
1,621 Views
22 Pages

Analysis of Techno–Economic and Social Impacts of Electric Vehicle Charging Ecosystem in the Distribution Network Integrated with Solar DG and DSTATCOM

  • Ramesh Bonela,
  • Sriparna Roy Ghatak,
  • Sarat Chandra Swain,
  • Fernando Lopes,
  • Sharmistha Nandi,
  • Surajit Sannigrahi and
  • Parimal Acharjee

16 January 2025

In this work, a comprehensive planning framework for an electric vehicle charging ecosystem (EVCE) is developed, incorporating solar distributed generation (DG) and a distribution static compensator (DSTATCOM), to assess their long-term techno–...

  • Article
  • Open Access
4 Citations
3,579 Views
20 Pages

A Vulnerability Scanning Method for Web Services in Embedded Firmware

  • Xiaocheng Ma,
  • Chenyv Yan,
  • Yunchao Wang,
  • Qiang Wei and
  • Yunfeng Wang

12 March 2024

As the Internet of Things (IoT) era arrives, the proliferation of IoT devices exposed to the Internet presents a significant challenge to device security. Firmware is software that operates within Internet of Things (IoT) devices, directly governing...

  • Article
  • Open Access
2 Citations
4,365 Views
21 Pages

14 August 2023

Today, as PHP application technology is becoming increasingly mature, the functions of modern multi-layer web applications are becoming more and more complete, and the complexity is also gradually increasing. While providing developers with various b...

  • Article
  • Open Access
14 Citations
3,553 Views
23 Pages

Numerical Analysis of Rubberized Steel Fiber Reinforced Concrete Beams Subjected to Static and Blast Loadings

  • Mahmoud T. Nawar,
  • Ahmed S. Eisa,
  • Mohamed T. Elshazli,
  • Yasser E. Ibrahim and
  • Ayman El-Zohairy

In recent years, the alarming number of terrorist attacks has highlighted the critical need for extensive research aimed at fortifying structures against explosion-induced loads. However, the insufficient energy absorption and brittleness of conventi...

  • Article
  • Open Access
1 Citations
1,063 Views
18 Pages

3 August 2025

This paper addresses the critical challenge of selecting suitable pile foundations in port engineering by systematically investigating the axial bearing behavior of large-diameter steel pipe piles and prestressed high-strength concrete (PHC) piles. T...

  • Article
  • Open Access
1,150 Views
13 Pages

4 September 2024

The ongoing replacement of synchronous machine generators (SMs) with converter-interface generators (CIGs) is raising the voltage unbalance of power systems, affecting power quality and grid stability. This paper focuses on a key power quality index...

  • Article
  • Open Access
9 Citations
3,239 Views
12 Pages

Enhancement of Gingival Tissue Adherence of Zirconia Implant Posts: In Vitro Study

  • Alexandra Zühlke,
  • Michael Gasik,
  • Khalil Shahramian,
  • Timo Närhi,
  • Yevgen Bilotsky and
  • Ilkka Kangasniemi

19 January 2021

Prevention of bacterial inflammation around dental implants (peri-implantitis) is one of the keys to success of the implantation and can be achieved by securing the gingival tissue-abutment interface preventing penetration of bacteria. Modern dental...

  • Article
  • Open Access
11 Citations
5,773 Views
18 Pages

Grey-Box Fuzzing Based on Reinforcement Learning for XSS Vulnerabilities

  • Xuyan Song,
  • Ruxian Zhang,
  • Qingqing Dong and
  • Baojiang Cui

15 February 2023

Cross-site scripting (XSS) vulnerabilities are significant threats to web applications. The number of XSS vulnerabilities reported has increased annually for the past three years, posing a considerable challenge to web application maintainers. Black-...

  • Article
  • Open Access
9 Citations
8,459 Views
10 Pages

External Connection versus Internal Connection in Dental Implantology. A Mechanical in vitro Study

  • Ignacio Fernández-Asián,
  • Álvaro Martínez-González,
  • Daniel Torres-Lagares,
  • María-Ángeles Serrera-Figallo and
  • José-Luis Gutiérrez-Pérez

15 October 2019

(1) Background: In today's dentistry, implantology has become a therapeutic resource of choice in certain clinical situations. The design of implants has evolved in several aspects since their inception. Dental implants were initially designed with a...

  • Article
  • Open Access
18 Citations
3,133 Views
19 Pages

12 April 2021

Glass fiber reinforced polymer (GFRP) composite laminates are considered the key material in many industries such as the infrastructure industries and the aerospace sector, and in building structures due to their superior specific strength and lightw...

  • Article
  • Open Access
1 Citations
1,016 Views
23 Pages

Analysis and Control of Voltage Stability in Offshore Wind Systems Under Small Disturbances

  • João P. L. Dantas,
  • Marley F. Tavares,
  • Ana J. O. Marques and
  • Murilo E. C. Bento

9 June 2025

This paper proposes an analysis of voltage stability under small disturbances following the integration of an offshore wind farm into a real power system, considering various load and generation scenarios under both normal and post-disturbance condit...

  • Article
  • Open Access
19 Citations
8,045 Views
30 Pages

During the last decade, the cybersecurity literature has conferred a high-level role to machine learning as a powerful security paradigm to recognise malicious software in modern anti-malware systems. However, a non-negligible limitation of machine l...

  • Article
  • Open Access
18 Citations
7,397 Views
15 Pages

5 March 2021

The evolution of the wind turbine to generate carbon-free renewable energy is rapidly growing. Thus, performing maintenance and inspection tasks in high altitude environments or difficult to access places, and even bad weather conditions, poses a pro...

  • Article
  • Open Access
3 Citations
2,613 Views
15 Pages

Study the Influence of Cable Breakage on Wind-Induced Vibration Characteristics of the Curved Beam Unilateral Stayed Bridge

  • Shuang Zhao,
  • Yi Shi,
  • Jiahao Chen,
  • Zhitao Yan,
  • Bin Zhang,
  • Xueqin Zhang and
  • Zhenqiang Wang

14 April 2023

Existing studies have found that curved beam unilateral stayed bridges (CBUSB) have a risk of cable breakage under the design wind velocity. To ensure structural wind-induced vibration security, it is necessary to study the wind-induced vibration cha...

  • Article
  • Open Access
1,994 Views
25 Pages

4 June 2025

The Intel® Trust Domain Extensions (TDX) encrypt guest memory and minimize host interactions to provide hardware-enforced isolation for sensitive virtual machines (VMs). Software vulnerabilities in the guest OS continue to pose a serious risk eve...

  • Article
  • Open Access
13 Citations
3,358 Views
24 Pages

Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection

  • Abimbola G. Akintola,
  • Abdullateef O. Balogun,
  • Luiz Fernando Capretz,
  • Hammed A. Mojeed,
  • Shuib Basri,
  • Shakirat A. Salihu,
  • Fatima E. Usman-Hamza,
  • Peter O. Sadiku,
  • Ghaniyyat B. Balogun and
  • Zubair O. Alanamu

6 May 2022

As a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware. The most extensively used...

  • Article
  • Open Access
6 Citations
8,536 Views
24 Pages

This research article delves into the development of a reinforcement learning (RL)-based continuous authentication system utilizing behavioral biometrics for user identification on computing devices. Keystroke dynamics are employed to capture unique...

of 2