{"title":"检测计算服务中反复出现的漏洞","authors":"Sarvesh Kumar, Kamlesh Kumar Dubey, A. Gautam, Shikha Verma, Vinay Kumar, Udit Mamodiya","doi":"10.1080/09720529.2022.2072432","DOIUrl":null,"url":null,"abstract":"Abstract In real time the open-source formulation and their effects are becoming highly enhanced for the development of applications. Security is the major area of technology to detect vulnerabilities. Mutual detection is time taking and very tough which is not feasible. There are a lot of techniques for the detection of vulnerabilities. In this research work we have developed the hybrid approach for the detection. We are using a huge software system. Our approach is based on the token formulation and fingerprint-based detection of errors. The tool we are designing is able to detect and patch the security related threats. We have also compared our approach with the existing approach and the performance and efficiency of our tool is much better than others.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1063 - 1071"},"PeriodicalIF":1.2000,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Detection of recurring vulnerabilities in computing services\",\"authors\":\"Sarvesh Kumar, Kamlesh Kumar Dubey, A. Gautam, Shikha Verma, Vinay Kumar, Udit Mamodiya\",\"doi\":\"10.1080/09720529.2022.2072432\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract In real time the open-source formulation and their effects are becoming highly enhanced for the development of applications. Security is the major area of technology to detect vulnerabilities. Mutual detection is time taking and very tough which is not feasible. There are a lot of techniques for the detection of vulnerabilities. In this research work we have developed the hybrid approach for the detection. We are using a huge software system. Our approach is based on the token formulation and fingerprint-based detection of errors. The tool we are designing is able to detect and patch the security related threats. We have also compared our approach with the existing approach and the performance and efficiency of our tool is much better than others.\",\"PeriodicalId\":46563,\"journal\":{\"name\":\"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY\",\"volume\":\"25 1\",\"pages\":\"1063 - 1071\"},\"PeriodicalIF\":1.2000,\"publicationDate\":\"2022-05-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/09720529.2022.2072432\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"MATHEMATICS, APPLIED\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/09720529.2022.2072432","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"MATHEMATICS, APPLIED","Score":null,"Total":0}
Detection of recurring vulnerabilities in computing services
Abstract In real time the open-source formulation and their effects are becoming highly enhanced for the development of applications. Security is the major area of technology to detect vulnerabilities. Mutual detection is time taking and very tough which is not feasible. There are a lot of techniques for the detection of vulnerabilities. In this research work we have developed the hybrid approach for the detection. We are using a huge software system. Our approach is based on the token formulation and fingerprint-based detection of errors. The tool we are designing is able to detect and patch the security related threats. We have also compared our approach with the existing approach and the performance and efficiency of our tool is much better than others.