A Novel Detection Method for the Security Vulnerability of Time-of-Check to Time-of-Use.
YungYu ZhuangYao-Nang TsengPublished in: J. Inf. Sci. Eng. (2022)
Keyphrases
- detection method
- security vulnerabilities
- face detection
- detection algorithm
- buffer overflow
- risk assessment
- feature detection
- access control
- information security
- security policies
- security risks
- security issues
- saliency detection
- security problems
- intrusion detection
- network security
- region detection
- penetration testing
- preprocessing
- detection rate