Nov. 30, 2022, 2:10 a.m. | Wen Zhou

cs.CR updates on arXiv.org arxiv.org

Context: The IoT system infrastructure platform facility vulnerability attack
has become the main battlefield of network security attacks. Most of the
traditional vulnerability mining methods rely on vulnerability detection tools
to realize vulnerability discovery. However, due to the inflexibility of tools
and the limitation of file size, its scalability It is relatively low and
cannot be applied to large-scale power big data fields. Objective: The goal of
the research is to intelligently detect vulnerabilities in source codes of
high-level languages …

code distributed iot mining representation source code system terminal under vulnerability

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

L2-Network Security Administrator

@ Kyndryl | KIN51515 Mumbai (KIN51515) We Work

Head of Cybersecurity Advisory and Architecture

@ CMA CGM | Marseille, FR

Systems Engineers/Cyber Security Engineers/Information Systems Security Engineer

@ KDA Consulting Inc | Herndon, Virginia, United States

R&D DevSecOps Staff Software Development Engineer 1

@ Sopra Steria | Noida, Uttar Pradesh, India