These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

113 related articles for article (PubMed ID: 37810359)

  • 1. DAFuzz: data-aware fuzzing of in-memory data stores.
    Zeng Y; Zhu F; Zhang S; Yang Y; Yi S; Pan Y; Xie G; Wu T
    PeerJ Comput Sci; 2023; 9():e1592. PubMed ID: 37810359
    [TBL] [Abstract][Full Text] [Related]  

  • 2. V-Fuzz: Vulnerability Prediction-Assisted Evolutionary Fuzzing for Binary Programs.
    Li Y; Ji S; Lyu C; Chen Y; Chen J; Gu Q; Wu C; Beyah R
    IEEE Trans Cybern; 2022 May; 52(5):3745-3756. PubMed ID: 32946405
    [TBL] [Abstract][Full Text] [Related]  

  • 3. CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection.
    Dai H; Murphy C; Kaiser G
    Int J Secur Softw Eng; 2010; 1(3):41-55. PubMed ID: 21037923
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Configuration Fuzzing for Software Vulnerability Detection.
    Dai H; Murphy C; Kaiser G
    Proc Int Conf Availab Reliab Secur; 2010 Feb; ():525-530. PubMed ID: 21461049
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A systematic review of fuzzing based on machine learning techniques.
    Wang Y; Jia P; Liu L; Huang C; Liu Z
    PLoS One; 2020; 15(8):e0237749. PubMed ID: 32810156
    [TBL] [Abstract][Full Text] [Related]  

  • 6. MultiFuzz: A Coverage-Based Multiparty-Protocol Fuzzer for IoT Publish/Subscribe Protocols.
    Zeng Y; Lin M; Guo S; Shen Y; Cui T; Wu T; Zheng Q; Wang Q
    Sensors (Basel); 2020 Sep; 20(18):. PubMed ID: 32933082
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Vulnerability-oriented directed fuzzing for binary programs.
    Yu L; Lu Y; Shen Y; Li Y; Pan Z
    Sci Rep; 2022 Mar; 12(1):4271. PubMed ID: 35277537
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.
    Wen S; Meng Q; Feng C; Tang C
    PLoS One; 2017; 12(10):e0186188. PubMed ID: 29049409
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A model-guided symbolic execution approach for network protocol implementations and vulnerability detection.
    Wen S; Meng Q; Feng C; Tang C
    PLoS One; 2017; 12(11):e0188229. PubMed ID: 29145458
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Smarter Evolution: Enhancing Evolutionary Black Box Fuzzing with Adaptive Models.
    Borcherding A; Morawetz M; Pfrang S
    Sensors (Basel); 2023 Sep; 23(18):. PubMed ID: 37765921
    [TBL] [Abstract][Full Text] [Related]  

  • 11. RLTG: Multi-targets directed greybox fuzzing.
    He Y; Zhu Y
    PLoS One; 2023; 18(4):e0278138. PubMed ID: 37043427
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Application-Oriented Data Migration to Accelerate In-Memory Database on Hybrid Memory.
    Zhao W; Du Y; Zhang M; Liu M; Jin K; Ausavarungnirun R
    Micromachines (Basel); 2021 Dec; 13(1):. PubMed ID: 35056217
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Ffuzz: Towards full system high coverage fuzz testing on binary executables.
    Zhang B; Ye J; Bi X; Feng C; Tang C
    PLoS One; 2018; 13(5):e0196733. PubMed ID: 29791469
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Fuzzing: a solution chosen by the FDA to investigate detection of software vulnerabilities.
    Baker SD
    Biomed Instrum Technol; 2014; Suppl():42-7. PubMed ID: 24848149
    [No Abstract]   [Full Text] [Related]  

  • 15. A New Embedded Key-Value Store for NVM Device Simulator.
    Cai T; He Q; Niu D; Chen F; Wang J; Li L
    Micromachines (Basel); 2020 Dec; 11(12):. PubMed ID: 33276585
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Assessing and assuring interoperability of a genomics file format.
    Niu YN; Roberts EG; Denisko D; Hoffman MM
    Bioinformatics; 2022 Jun; 38(13):3327-3336. PubMed ID: 35575355
    [TBL] [Abstract][Full Text] [Related]  

  • 17. MalFuzz: Coverage-guided fuzzing on deep learning-based malware classification model.
    Liu Y; Yang P; Jia P; He Z; Luo H
    PLoS One; 2022; 17(9):e0273804. PubMed ID: 36107957
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Memcached: An Experimental Study of DDoS Attacks for the Wellbeing of IoT Applications.
    Mishra N; Pandya S; Patel C; Cholli N; Modi K; Shah P; Chopade M; Patel S; Kotecha K
    Sensors (Basel); 2021 Dec; 21(23):. PubMed ID: 34884075
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Rationale and Proposed Design for a Mars Sample Return (MSR) Science Program.
    Haltigin T; Hauber E; Kminek G; Meyer MA; Agee CB; Busemann H; Carrier BL; Glavin DP; Hays LE; Marty B; Pratt LM; Udry A; Zorzano MP; Beaty DW; Cavalazzi B; Cockell CS; Debaille V; Grady MM; Hutzler A; McCubbin FM; Regberg AB; Smith AL; Smith CL; Summons RE; Swindle TD; Tait KT; Tosca NJ; Usui T; Velbel MA; Wadhwa M; Westall F
    Astrobiology; 2022 Jun; 22(S1):S27-S56. PubMed ID: 34904885
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Coverage-guided differential testing of TLS implementations based on syntax mutation.
    Pan Y; Lin W; He Y; Zhu Y
    PLoS One; 2022; 17(1):e0262176. PubMed ID: 35073360
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.