The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Exploitability with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2002-2013 (15) 2014-2019 (17) 2020-2021 (17) 2022-2023 (27)
Publication types (Num. hits)
article(35) inproceedings(40) phdthesis(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 18 occurrences of 18 keywords

Results
Found 76 publication records. Showing 76 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
36Melanie Tupper, Nur Zincir-Heywood VEA-bility Security Metric: A Network Security Analysis Tool. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF network security, Attackability, Vulnerability, security metric, attack graphs, exploit, Exploitability, quantitative measure
25Matthew Green 0001, Mathias Hall-Andersen, Eric Hennenfent, Gabriel Kaptchuk, Benjamin Perez, Gijs Van Laer Efficient Proofs of Software Exploitability for Real-world Processors. Search on Bibsonomy Proc. Priv. Enhancing Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Supraja Baskaran, Lianying Zhao, Mohammad Mannan, Amr M. Youssef Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Carlos Martin, Tuomas Sandholm Computing equilibria by minimizing exploitability with best-response ensembles. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Jiongxiao Wang, Junlin Wu 0001, Muhao Chen, Yevgeniy Vorobeychik, Chaowei Xiao On the Exploitability of Reinforcement Learning with Human Feedback for Large Language Models. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Manli Shu, Jiongxiao Wang, Chen Zhu 0001, Jonas Geiping, Chaowei Xiao, Tom Goldstein On the Exploitability of Instruction Tuning. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Ruipeng Wang, Kaixiang Chen, Zulie Pan, Yuwei Li, Qianyu Li, Yang Li, Min Zhang, Chao Zhang 0008 Tunter: Assessing Exploitability of Vulnerabilities with Taint-Guided Exploitable States Exploration. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Jiao Yin 0003, Guihong Chen, Wei Hong, Hua Wang 0002, Jinli Cao, Yuan Miao 0001 Empowering Vulnerability Prioritization: A Heterogeneous Graph-Driven Framework for Exploitability Prediction. Search on Bibsonomy WISE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Linhao He, Yunchao Wang, Chenyu Yan, Xixing Li, Qiang Wei KBEE: Linux Kernel Vulnerability Exploitability Exploration. Search on Bibsonomy ICCEIC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Xiang Tang, Houlin Zhou, Man Zhang, Yuheng Zhang, Guocheng Wu 0003, Hui Lu, Xiang Yu, Zhihong Tian Research on the Exploitability of Binary Software Vulnerabilities. Search on Bibsonomy CloudNet The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Supraja Baskaran, Lianying Zhao, Mohammad Mannan, Amr M. Youssef Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case. Search on Bibsonomy RAID The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Seong-Su Yoon, Do-Yeon Kim, Ga-Gyeong Kim, Ieck-Chae Euom Vulnerability Assessment Framework Based on In-The-Wild Exploitability for Prioritizing Patch Application in Control System. Search on Bibsonomy WISA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Manli Shu, Jiongxiao Wang, Chen Zhu 0001, Jonas Geiping, Chaowei Xiao, Tom Goldstein On the Exploitability of Instruction Tuning. Search on Bibsonomy NeurIPS The full citation details ... 2023 DBLP  BibTeX  RDF
25Zheyue Jiang, Yuan Zhang, Jun Xu, Xinqian Sun, Zhuang Liu, Min Yang 0002 AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities. Search on Bibsonomy SP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Zheyue Jiang, Yuan Zhang 0009, Jun Xu 0024, Xinqian Sun, Zhuang Liu, Min Yang 0002 AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities. Search on Bibsonomy SP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Jiao Yin 0003, MingJian Tang 0001, Jinli Cao, Hua Wang 0002, Mingshan You A real-time dynamic concept adaptive learning algorithm for exploitability prediction. Search on Bibsonomy Neurocomputing The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Pavel Czempin, Adam Gleave Reducing Exploitability with Population Based Training. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Denizalp Goktas, Amy Greenwald Exploitability Minimization in Games and Beyond. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Matthew Green 0001, Mathias Hall-Andersen, Eric Hennenfent, Gabriel Kaptchuk, Benjamin Perez, Gijs Van Laer Efficient Proofs of Software Exploitability for Real-world Processors. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
25Kai Lehniger, Peter Langendörfer Through the Window: On the exploitability of Xtensa's Register Window Overflow. Search on Bibsonomy ITNAC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Anthony DiGiovanni, Ambuj Tewari Balancing adaptability and non-exploitability in repeated games. Search on Bibsonomy UAI The full citation details ... 2022 DBLP  BibTeX  RDF
25Mubin Ul Haque, Muhammad Ali Babar 0001 Well Begun is Half Done: An Empirical Study of Exploitability & Impact of Base-Image Vulnerabilities. Search on Bibsonomy SANER The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Octavian Suciu, Connor Nelson, Zhuoer Lyu, Tiffany Bao, Tudor Dumitras Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2022 DBLP  BibTeX  RDF
25Thiago Figueiredo Costa, Mateus Tymburibá Exploitability Assessment with Genetically Tuned Interconnected Neural Networks. Search on Bibsonomy BRACIS (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Hong Jin Kang, Truong Giang Nguyen, Xuan-Bach Dinh Le, Corina S. Pasareanu, David Lo 0001 Test mimicry to assess the exploitability of library vulnerabilities. Search on Bibsonomy ISSTA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Denizalp Goktas, Amy Greenwald Exploitability Minimization in Games and Beyond. Search on Bibsonomy NeurIPS The full citation details ... 2022 DBLP  BibTeX  RDF
25Ahmet Okutan, Mehdi Mirakhorli Predicting the severity and exploitability of vulnerability reports using convolutional neural nets. Search on Bibsonomy EnCyCriS@ICSE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Finbarr Timbers, Nolan Bard, Edward Lockhart, Marc Lanctot, Martin Schmid, Neil Burch, Julian Schrittwieser, Thomas Hubert, Michael Bowling Approximate Exploitability: Learning a Best Response. Search on Bibsonomy IJCAI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Julio Manuel de Luis-Ruiz, Benito Ramiro Salas-Menocal, Gema Fernández-Maroto, Rubén Pérez-Álvarez, Raúl Pereda-García Determination of Environmental Factors for the Implementation of the Exploitability Index in Industrial Aggregate Mining Using Multi-Criteria Analysis. Search on Bibsonomy ISPRS Int. J. Geo Inf. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Navneet Bhatt, Adarsh Anand, Venkata S. S. Yadavalli Exploitability prediction of software vulnerabilities. Search on Bibsonomy Qual. Reliab. Eng. Int. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Anthony DiGiovanni, Ambuj Tewari Balancing Adaptability and Non-exploitability in Repeated Games. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
25Mubin Ul Haque, Muhammad Ali Babar 0001 Well Begun is Half Done: An Empirical Study of Exploitability & Impact of Base-Image Vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
25Adelin Travers, Lorna Licollari, Guanghan Wang, Varun Chandrasekaran, Adam Dziedzic, David Lie, Nicolas Papernot On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
25Octavian Suciu, Connor Nelson, Zhuoer Lyu, Tiffany Bao, Tudor Dumitras Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
25Jinghui Lyu, Yude Bai, Zhenchang Xing, Xiaohong Li 0001, Weimin Ge A Character-Level Convolutional Neural Network for Predicting Exploitability of Vulnerability. Search on Bibsonomy TASE The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Kenshi Abe, Yusuke Kaneko Off-Policy Exploitability-Evaluation in Two-Player Zero-Sum Markov Games. (PDF / PS) Search on Bibsonomy AAMAS The full citation details ... 2021 DBLP  BibTeX  RDF
25Thomas Dullien Weird Machines, Exploitability, and Provable Unexploitability. Search on Bibsonomy IEEE Trans. Emerg. Top. Comput. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Yaman Roumani, Joseph Nwankpa Examining Exploitability Risk of Vulnerabilities: A Hazard Model. Search on Bibsonomy Commun. Assoc. Inf. Syst. The full citation details ... 2020 DBLP  BibTeX  RDF
25Finbarr Timbers, Edward Lockhart, Martin Schmid, Marc Lanctot, Michael Bowling Approximate exploitability: Learning a best response in large games. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
25Noam Moscovich, Ron Bitton, Yakov Mallah, Masaki Inokuchi, Tomohiko Yagyu, Meir Kalech, Yuval Elovici, Asaf Shabtai Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
25Kenshi Abe, Yusuke Kaneko Off-Policy Exploitability-Evaluation and Equilibrium-Learning in Two-Player Zero-Sum Markov Games. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
25Jason Jaskolka Evaluating the Exploitability of Implicit Interactions in Distributed Systems. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
25Jiao Yin 0003, MingJian Tang 0001, Jinli Cao, Hua Wang 0002 Apply transfer learning to cybersecurity: Predicting exploitability of vulnerabilities by description. Search on Bibsonomy Knowl. Based Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Keerthi K. 0002, Indrani Roy, Chester Rebeiro, Aritra Hazra, Swarup Bhunia FEDS: Comprehensive Fault Attack Exploitability Detection for Software Implementations of Block Ciphers. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Fenglei Deng, Jian Wang 0020, Bin Zhang, Chao Feng, Zhiyuan Jiang, Yunfei Su A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities. Search on Bibsonomy Sci. Program. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Edward Lockhart, Marc Lanctot, Julien Pérolat, Jean-Baptiste Lespiau, Dustin Morrill, Finbarr Timbers, Karl Tuyls Computing Approximate Equilibria in Sequential Adversarial Games by Exploitability Descent. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
25Seong-Kyun Mok, Eun-Sun Cho TraceFilter: An Exploitability Analyzer of Vulnerabilities in Binary Code. Search on Bibsonomy DASC/PiCom/DataCom/CyberSciTech The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Edward Lockhart, Marc Lanctot, Julien Pérolat, Jean-Baptiste Lespiau, Dustin Morrill, Finbarr Timbers, Karl Tuyls Computing Approximate Equilibria in Sequential Adversarial Games by Exploitability Descent. Search on Bibsonomy IJCAI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Zhiyuan Jiang, Chao Feng, Chaojing Tang An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Jeremy Pitt From Usability to Exploitability: Digital Technology and Non-Participatory Design [Editorial]. Search on Bibsonomy IEEE Technol. Soc. Mag. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Jing Zhang, Anmin Zhou, Liang Liu, Peng Jia 0005, Luping Liu Crash可利用性分析方法研究综述 (Review of Crash Exploitability Analysis Methods). Search on Bibsonomy 计算机科学 The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Martin Salfer, Claudia Eckert 0001 Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board Networks. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Shubham Tripathi, Gustavo Grieco, Sanjay Rawat 0001 Exniffer: Learning to Prioritize Crashes by Assessing the Exploitability from Memory Dump. Search on Bibsonomy APSEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Guanhua Yan, Junchen Lu, Zhan Shu, Yunus Kucuk ExploitMeter: Combining Fuzzing with Machine Learning for Automated Evaluation of Software Exploitability. Search on Bibsonomy PAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Jianshan Peng, Mi Zhang, Qingxian Wang Deduplication and Exploitability Determination of UAF Vulnerability Samples by Fast Clustering. Search on Bibsonomy KSII Trans. Internet Inf. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25Awad A. Younis, Yashwant K. Malaiya, Indrajit Ray Assessing vulnerability exploitability risk using software properties. Search on Bibsonomy Softw. Qual. J. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25Enrico Daga, Mathieu d'Aquin, Alessandro Adamou, Enrico Motta Addressing exploitability of Smart City data. Search on Bibsonomy ISC2 The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25Guanhua Yan, Yunus Kucuk, Max Slocum, David C. Last A Bayesian Cogntive Approach to Quantifying Software Exploitability Based on Reachability Testing. Search on Bibsonomy ISC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25Rattikorn Hewett, Phongphun Kijsanayothin Ranking Intrusion Likelihoods with Exploitability of Network Vulnerabilities in a Large-Scale Attack Model. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2015 DBLP  BibTeX  RDF
25Subil Abraham, Suku Nair Exploitability analysis using predictive cybersecurity framework. Search on Bibsonomy CYBCONF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
25Awad A. Younis, Yashwant K. Malaiya, Indrajit Ray Using Attack Surface Entry Points and Reachability Analysis to Assess the Risk of Software Vulnerability Exploitability. Search on Bibsonomy HASE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Stephen Checkoway, Ruben Niederhagen, Adam Everspaugh, Matthew Green 0001, Tanja Lange 0001, Thomas Ristenpart, Daniel J. Bernstein, Jake Maskiewicz, Hovav Shacham, Matthew Fredrikson On the Practical Exploitability of Dual EC in TLS Implementations. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2014 DBLP  BibTeX  RDF
25Angeles Saavedra, Javier Taboada, María Araújo, Eduardo Giráldez Generalized Linear Spatial Models to Predict Slate Exploitability. Search on Bibsonomy J. Appl. Math. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
25Gustavo Grieco, Laurent Mounier, Marie-Laure Potet, Sanjay Rawat 0001 A Stack Model for Symbolic Buffer Overflow Exploitability Analysis. Search on Bibsonomy ICST Workshops The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
25Zhikun Wang, Abdeslam Boularias, Katharina Mülling, Jan Peters 0001 Balancing Safety and Exploitability in Opponent Modeling. Search on Bibsonomy AAAI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Falko Saust, Oliver Bley, Ralf Kutzner, Jörn-Marten Wille, Bernhard Friedrich, Markus Maurer Exploitability of vehicle related sensor data in cooperative systems. Search on Bibsonomy ITSC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25John Tinsley, Andy Way Automatically generated parallel treebanks and their exploitability in machine translation. Search on Bibsonomy Mach. Transl. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Mehran Bozorgi A machine learning framework for classifying invulnerabilites [sic] and predicting exploitability. Search on Bibsonomy 2009   RDF
23Pierre Parrend, Stéphane Frénot Classification of Component Vulnerabilities in Java Service Oriented Programming (SOP) Platforms. Search on Bibsonomy CBSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Howard Chivers Information Modeling for Automated Risk Analysis. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, model, communication, information, risk, service-oriented, threat
23Wim Heirman, Joni Dambre, Jan Van Campenhout, Christof Debaes, Hugo Thienpont Traffic Temporal Analysis for Reconfigurable Interconnects in Shared-Memory Systems. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Howard Chivers, Jeremy Jacob Specifying Information-Flow Controls. Search on Bibsonomy ICDCS Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Peter J. Bentley Fractal Proteins. Search on Bibsonomy Genet. Program. Evolvable Mach. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF fractal proteins, scalability, complexity, development, evolvability
23Vijay Sai, Xavier Franch, Neil A. M. Maiden Driving Component Selection through Actor-Oriented Models and Use Cases. Search on Bibsonomy ICCBSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Peter J. Bentley Evolving Fractal Proteins. Search on Bibsonomy ICES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
23Mihaela D. Pal, Christopher M. Brislawn, Steven P. Brumby Feature Extraction from Hyperspectral Images Compressed Using the JPEG-2000 Standard. Search on Bibsonomy SSIAI The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #76 of 76 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license