Automatic Analysis and Reasoning Based on Vulnerability Knowledge Graph

Author(s):  
Shengzhi Qin ◽  
K. P. Chow
1994 ◽  
Vol 33 (01) ◽  
pp. 157-160 ◽  
Author(s):  
S. Kruse-Andersen ◽  
J. Kolberg ◽  
E. Jakobsen

Abstract:Continuous recording of intraluminal pressures for extended periods of time is currently regarded as a valuable method for detection of esophageal motor abnormalities. A subsequent automatic analysis of the resulting motility data relies on strict mathematical criteria for recognition of pressure events. Due to great variation in events, this method often fails to detect biologically relevant pressure variations. We have tried to develop a new concept for recognition of pressure events based on a neural network. Pressures were recorded for over 23 hours in 29 normal volunteers by means of a portable data recording system. A number of pressure events and non-events were selected from 9 recordings and used for training the network. The performance of the trained network was then verified on recordings from the remaining 20 volunteers. The accuracy and sensitivity of the two systems were comparable. However, the neural network recognized pressure peaks clearly generated by muscular activity that had escaped detection by the conventional program. In conclusion, we believe that neu-rocomputing has potential advantages for automatic analysis of gastrointestinal motility data.


Author(s):  
Phichayasini Kitwatthanathawon ◽  
Thara Angskun ◽  
Jitimon Angskun

Author(s):  
Fengfeng He ◽  
Ling Zhang ◽  
Wei Qu ◽  
Chong Teng ◽  
Dan Xie

2020 ◽  
Vol 2 (2) ◽  
Author(s):  
Suzanna Schmeelk ◽  
Lixin Tao

Many organizations, to save costs, are movinheg to t Bring Your Own Mobile Device (BYOD) model and adopting applications built by third-parties at an unprecedented rate.  Our research examines software assurance methodologies specifically focusing on security analysis coverage of the program analysis for mobile malware detection, mitigation, and prevention.  This research focuses on secure software development of Android applications by developing knowledge graphs for threats reported by the Open Web Application Security Project (OWASP).  OWASP maintains lists of the top ten security threats to web and mobile applications.  We develop knowledge graphs based on the two most recent top ten threat years and show how the knowledge graph relationships can be discovered in mobile application source code.  We analyze 200+ healthcare applications from GitHub to gain an understanding of their software assurance of their developed software for one of the OWASP top ten moble threats, the threat of “Insecure Data Storage.”  We find that many of the applications are storing personally identifying information (PII) in potentially vulnerable places leaving users exposed to higher risks for the loss of their sensitive data.


2019 ◽  
Author(s):  
Jemmy Wiratama
Keyword(s):  

I'm an Science & Technology enthusiast. I still learn how to build a knowledge graph and how to write a paper.


2013 ◽  
Vol 40 (2) ◽  
pp. 188
Author(s):  
Hai-Ning ZHANG ◽  
Wen-Ming HUANG ◽  
Jia-Jun FU ◽  
Xiang-Ping XU ◽  
Tao XU

Sign in / Sign up

Export Citation Format

Share Document