-
1Academic Journal
Authors: Yoo, Eunae1 (AUTHOR) yooeun@iu.edu, Craighead, Christopher W.2 (AUTHOR) craighead@utk.edu, Samtani, Sagar3 (AUTHOR) ssamtani@iu.edu
Source: Journal of Management Information Systems. 2025, Vol. 42 Issue 4, p1149-1176. 28p.
-
2Periodical
Authors: Telang, Rahul1 (AUTHOR) rtelang@andrew.cmu.edu, Hydari, Muhammad Zia2 (AUTHOR) hydari@alum.mit.edu
Source: Communications of the ACM. Aug2025, Vol. 68 Issue 8, p20-23. 4p.
-
3Periodical
Authors: Meneely, Andy1 (AUTHOR) Andy.meneely@rit.edu, Keller, Brandon1 (AUTHOR) bnk5096@rit.edu
Source: Communications of the ACM. Sep2025, Vol. 68 Issue 9, p34-36. 3p.
-
4Periodical
Source: Communications of the ACM. Dec2025, Vol. 68 Issue 12, p7-7. 1p.
Subject Terms: *COMPUTER security vulnerabilities, *COMPUTER security, *DATA security failures
-
5Academic Journal
Authors: Jarkas, Omar1 (AUTHOR) o.jarkas@uq.edu.au, Ko, Ryan2 (AUTHOR) ryan.ko@uq.edu.au, Dong, Naipeng2 (AUTHOR) n.dong@uq.edu.au, Mahmud, Redowan3 (AUTHOR) Mdredowan.Mahmud@curtin.edu.au
Source: ACM Computing Surveys. Jul2025, Vol. 57 Issue 7, p1-36. 36p.
-
6Academic Journal
Authors: Fizan, Muhmmad1,2 (AUTHOR), Awad Abdellatif, Alaa3 (AUTHOR) alaa.abdellatif@ieee.org, Asad, Muhammad2 (AUTHOR), Zubair, Muhammad2 (AUTHOR), Ni, Bin1 (AUTHOR), Xu, Bin1 (AUTHOR), Liu, Xuefeng1 (AUTHOR), Xiong, Jichuan1 (AUTHOR) jichuan.xiong@njust.edu.cn, Qasim Mehmood, Muhammad2 (AUTHOR) qasim.mehmood@itu.edu.pk
Source: Cluster Computing. Dec2025, Vol. 28 Issue 16, p1-15. 15p.
Linked Full TextSubject Terms: *FEDERATED learning, *COMPUTER security vulnerabilities, *ARTIFICIAL intelligence
-
7Academic Journal
Authors: Daghita, David1 (AUTHOR), Lipkowitz, Scott2 (AUTHOR) slipkowitz@oflibrary.org
Source: Public Library Quarterly. Nov2025, p1-9. 9p.
Subject Terms: *PUBLIC libraries, *COMPUTER security vulnerabilities, *SECURITY systems, *INTERNET security, *INTEGRATED library systems (Computer systems)
-
8Academic Journal
Authors: Shibahara, Toshiki1
Source: NTT Technical Review. Nov2025, Vol. 23 Issue 11, p54-58. 5p.
Subject Terms: *LANGUAGE models, *COMPUTER security vulnerabilities, *SECURITY systems, *LABORATORIES, *RESEARCH & development projects, *AUTOMATION software
-
9Academic Journal
Authors: Zhang, Weijie1 (AUTHOR) 15250700511@163.com, Chen, Ting2 (AUTHOR) brokendragon@uestc.edu.cn, Li, Teng2 (AUTHOR) tengli2866@gmail.com, Wang, Ze1 (AUTHOR) 1906394126@qq.com, Zhu, Zhichao1 (AUTHOR) 510230765@qq.com, Shen, Hangbin1 (AUTHOR) shen673527255@qq.com
Source: Cluster Computing. Oct2025, Vol. 28 Issue 10, p1-12. 12p.
Linked Full TextSubject Terms: *COMPUTER security vulnerabilities, *BLOCKCHAINS, *PROGRAMMING languages, *SECURITY systems, *DATA integrity, *DETECTION algorithms
-
10Academic Journal
Authors: Thien, Tran Chi1 (AUTHOR) tranchithien@tdtu.edu.vn
Source: Programming & Computer Software. Oct2025, Vol. 51 Issue 5, p349-356. 8p.
Subject Terms: *COMPUTER security vulnerabilities, *COMPUTER software, *LIBRARY software, *COMPUTER programming, *SOURCE code
-
11Academic Journal
Authors: Al-Azzawi, Ameen1 (AUTHOR), Lencse, Gábor1 (AUTHOR)
Source: Computer Journal. Oct2025, Vol. 68 Issue 10, p1450-1462. 13p.
Subject Terms: *INTERNET protocol version 6, *COMPUTER security vulnerabilities, *RISK assessment, *INFORMATION technology
Linked Full Text -
12Academic Journal
Authors: Nazir, Iqra1 (AUTHOR), Mushtaq, Nermish1 (AUTHOR), Amin, Waqas (AUTHOR) sheikhwaqasamin@hotmail.com
Source: Energies (19961073). Oct2025, Vol. 18 Issue 19, p5076. 77p.
Subject Terms: *DATA privacy, *COMPUTER security vulnerabilities, *ENERGY storage, *DATA protection, *INTERNET security, *SMART power grids, *CRYPTOGRAPHY, *SUPPLY & demand
-
13Academic Journal
Authors: Lastre, Jhury Kevin1 (AUTHOR), Ko, Yongho1 (AUTHOR), Kwon, Hoseok1 (AUTHOR), You, Ilsun1 (AUTHOR) isyou@kookmin.ac.kr
Source: Sensors (14248220). Oct2025, Vol. 25 Issue 19, p6144. 33p.
-
14Periodical
Authors: Cox, Russ
Source: Communications of the ACM; Oct2025, Vol. 68 Issue 10, p88-95, 8p
Subject Terms: OPEN source software, COMPUTER software security, COMPUTER security vulnerabilities, KERNEL operating systems
Company/Entity: HONEYWELL International Inc.
-
15Academic Journal
Authors: Li, Lining1 (AUTHOR) li_lining@nuaa.edu.cn, Ren, Rong2,3 (AUTHOR) renrongysu@hotmail.com, Dong, Jun2,3 (AUTHOR) dongjun@ysu.edu.cn, Zhang, Bing2,3 (AUTHOR) bingzhang@ysu.edu.cn, Kang, Xu2,4 (AUTHOR) luckykang@cupk.edu.cn
Source: International Journal of Software Engineering & Knowledge Engineering. May2025, Vol. 35 Issue 5, p609-656. 48p.
Subject Terms: *COMPUTER security vulnerabilities, *COMPUTER software industry, *COMPUTER software development, SOFTWARE architecture, RESEARCH personnel
-
16Academic Journal
Authors: Dai, Peng1 (AUTHOR) pdai@czu.edu.cn, Ma, Xiaoqin1 (AUTHOR), Peng, Zebo2 (AUTHOR), Zhao, Chen3 (AUTHOR), Zhang, Qianjin4 (AUTHOR)
Source: International Journal of Software Engineering & Knowledge Engineering. Apr2025, Vol. 35 Issue 4, p469-501. 33p.
Subject Terms: *COMPUTER security vulnerabilities, *SYSTEMS software, COMPUTER software security, POINT defects, DEBUGGING
-
17Academic Journal
Authors: Kim, Yongjae1 (AUTHOR), An, Hyeonjun2 (AUTHOR), Han, Dong-Guk1,2 (AUTHOR) christa@kookmin.ac.kr
Source: Sensors (14248220). Sep2025, Vol. 25 Issue 18, p5900. 18p.
Subject Terms: *SMARTPHONES, *COMPUTER security vulnerabilities, *TELECOMMUNICATION, *SOUND recording & reproducing, *BIT error rate, *MOBILE apps, *MODULATION theory
Reviews & Products: ANDROID (Operating system)
-
18Academic Journal
Authors: Weng, Shiyu1 (AUTHOR) shiyuweng0226@163.com, Wu, Xiaoxue1 (AUTHOR) xiaoxuewu@yzu.edu.cn, Li, Tianci1 (AUTHOR), Yao, Chen1 (AUTHOR), Shan, Wenjing1 (AUTHOR), Sun, Xiaobing1 (AUTHOR)
Source: Journal of Software: Evolution & Process. Sep2025, Vol. 37 Issue 9, p1-17. 17p.
Subject Terms: *LINUX operating systems, *COMPUTER security vulnerabilities, *KNOWLEDGE graphs, *DATA analysis, *SECURITY management, *COMPUTER operating systems
Linked Full Text -
19Academic Journal
Authors: DAWSON, Maurice1 mdawson2@illinoistech.edu, KHAN, Abdul Hadi1 akhan172@hawk.illinoistech.edu
Source: Land Forces Academy Review. Sep2025, Vol. 30 Issue 3, p454-465. 12p.
Subject Terms: *COMPUTER security vulnerabilities, *TAXONOMY, *ASTRONAUTICS, *DISASTER resilience, *INFORMATION technology, *CYBERTERRORISM, *INFORMATION technology security
-
20Academic Journal
A comprehensive survey of deep face verification systems adversarial attacks and defense strategies.
Authors: Kilany, Sohair1 (AUTHOR) sohair_kilany@mu.edu.eg, Mahfouz, Ahmed1,2 (AUTHOR) ahmed.m@aou.edu.om
Source: Scientific Reports. 8/22/2025, Vol. 15 Issue 1, p1-22. 22p.
Linked Full TextSubject Terms: *ARTIFICIAL neural networks, *COMPUTER security vulnerabilities, *ELECTRONIC authentication, *ALGORITHMS, *HUMAN facial recognition software, *DECEPTION