|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1767 occurrences of 913 keywords
|
|
|
Results
Found 4178 publication records. Showing 4178 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
89 | Jon Heffley, Pascal Meunier |
Can Source Code Auditing Software Identify Common Vulnerabilities and Be Used to Evaluate Software Security? ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
86 | Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker |
Beyond heuristics: learning to classify vulnerabilities and predict exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, July 25-28, 2010, pp. 105-114, 2010, ACM, 978-1-4503-0055-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
SVM, supervised learning, vulnerabilities, exploits |
79 | Hossain Shahriar, Mohammad Zulkernine |
Mutation-Based Testing of Buffer Overflow Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2008, 28 July - 1 August 2008, Turku, Finland, pp. 979-984, 2008, IEEE Computer Society, 978-0-7695-3262-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Mutation-based testing, Vulnerabilities, Buffer overflow |
79 | Shuo Chen 0001, Zbigniew Kalbarczyk, Jun Xu 0003, Ravishankar K. Iyer |
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2003 International Conference on Dependable Systems and Networks (DSN 2003), 22-25 June 2003, San Francisco, CA, USA, Proceedings, pp. 605-614, 2003, IEEE Computer Society, 0-7695-1952-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
data analysis, security vulnerabilities, finite state machine modeling |
75 | Anil Sharma, Jason R. Martin, Nitin Anand, Michel Cukier, William H. Sanders |
Ferret: A Host Vulnerability Checking Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 3-5 March 2004, Papeete, Tahiti, pp. 389-394, 2004, IEEE Computer Society, 0-7695-2076-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Security auditing tool, host vulnerabilities, security evaluation |
74 | Matin Tamizi, Matt Weinstein, Michel Cukier |
Automated Checking for Windows Host Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSRE ![In: 16th International Symposium on Software Reliability Engineering (ISSRE 2005), 8-11 November 2005, Chicago, IL, USA, pp. 139-148, 2005, IEEE Computer Society, 0-7695-2482-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
67 | Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu 0003 |
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 562-572, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
memory corruption, debugging, vulnerability analysis |
60 | Istehad Chowdhury, Mohammad Zulkernine |
Can complexity, coupling, and cohesion metrics be used as early indicators of vulnerabilities? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 1963-1969, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
security, complexity, empirical study, software metrics, coupling, vulnerability, software security, cohesion |
60 | Gary Wassermann, Zhendong Su 0001 |
Static detection of cross-site scripting vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 30th International Conference on Software Engineering (ICSE 2008), Leipzig, Germany, May 10-18, 2008, pp. 171-180, 2008, ACM, 978-1-60558-079-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
static analysis, web applications, cross-site scripting, input validation |
60 | Sung-Whan Woo, Omar Hussain Alhazmi, Yashwant K. Malaiya |
Assessing Vulnerabilities in Apache and IIS HTTP Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASC ![In: Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September - 1 October 2006, Indianapolis, Indiana, USA, pp. 103-110, 2006, IEEE Computer Society, 0-7695-2539-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
56 | Shuo Chen, Hong Chen, Manuel Caballero |
Residue objects: a challenge to web browser security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: European Conference on Computer Systems, Proceedings of the 5th European conference on Computer systems, EuroSys 2010, Paris, France, April 13-16, 2010, pp. 279-292, 2010, ACM, 978-1-60558-577-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
component object model (com), residue object, browser security |
56 | Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili, Reza Zakeri, Ali Reza Omidian |
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 256-268, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Pranith D. Kumar, Anchal Nema, Rajeev Kumar |
Hybrid analysis of executables to detect security vulnerabilities: security vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISEC ![In: Proceeding of the 2nd Annual India Software Engineering Conference, ISEC 2009, Pune, India, February 23-26, 2009, pp. 141-142, 2009, ACM, 978-1-60558-426-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
hybrid analysis, instrumentation, slicing, security vulnerabilities, memory errors |
53 | Kaarina Karppinen, Lyly Yonkwa, Mikael Lindvall |
Why Developers Insert Security Vulnerabilities into Their Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACHI ![In: Second International Conference on Advances in Computer-Human Interaction, ACHI 2009, February 1-7, 2009, Cancun, Mexico, pp. 289-294, 2009, IEEE, 978-0-7695-3529-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
53 | Kwangsun Ko, Insook Jang, Yong-hyeog Kang, JinSeok Lee, Young Ik Eom |
Characteristic Classification and Correlation Analysis of Source-Level Vulnerabilities in the Linux Kernel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 1149-1156, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Steve Wood, Gordon W. Romney |
Protection methods against IP packet attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 5th Conference on Information Technology Education, SIGITE 2004, 2004, Salt Lake City, UT, USA, October 28-30, 2004, pp. 276, 2004, ACM, 1-58113-936-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
TCP vulnerabilities, UDP vulnerabilities, packet inspection, intrusion detection systems, firewalls, access control list, intrusion prevention systems |
51 | K. Sivakumar, K. Garg |
Constructing a "Common Cross Site Scripting Vulnerabilities Enumeration (CXE)" Using CWE and CVE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings, pp. 277-291, 2007, Springer, 978-3-540-77085-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Secure code, PHP Vulnerabilities, CWE, CVE, Web Security, XSS |
51 | Greg Goth |
Functionality Meets Terminology to Address Network Security Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Distributed Syst. Online ![In: IEEE Distributed Syst. Online 7(6), 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
network security vulnerabilities, computer security |
49 | Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan |
An OVAL-based active vulnerability assessment system for enterprise computer networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 10(5), pp. 573-588, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Open vulnerability assessment language, Attack path, Network security, Relational database management system, Predicate logic, Security vulnerability |
49 | Aaron Steele |
Ontological Vulnerability Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISE Workshops ![In: Web Information Systems Engineering - WISE 2008 Workshops, WISE 2008 International Workshops, Auckland, New Zealand, September 1-4, 2008. Proceedings, pp. 24-35, 2008, Springer, 978-3-540-85199-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Yao-Wen Huang, Fang Yu 0001, Christian Hang, Chung-Hung Tsai, Der-Tsai Lee, Sy-Yen Kuo |
Securing web application code by static analysis and runtime protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 13th international conference on World Wide Web, WWW 2004, New York, NY, USA, May 17-20, 2004, pp. 40-52, 2004, ACM, 1-58113-844-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
program security, verification, type systems, information flow, noninterference, web application security, security vulnerabilities |
46 | Pierre Parrend |
Enhancing Automated Detection of Vulnerabilities in Java Components. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 216-223, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Nuno Antunes, Nuno Laranjeiro, Marco Vieira, Henrique Madeira |
Effective Detection of SQL/XPath Injection Vulnerabilities in Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC ![In: 2009 IEEE International Conference on Services Computing (SCC 2009), 21-25 September 2009, Bangalore, India, pp. 260-267, 2009, IEEE Computer Society, 978-0-7695-3811-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Yonesy F. Nunez |
Maximizing an Organization's Information Security Posture by Distributedly Assessing and Remedying System Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNSC ![In: Proceedings of the IEEE International Conference on Networking, Sensing and Control, ICNSC 2008, Hainan, China, 6-8 April 2008, pp. 1148-1152, 2008, IEEE, 978-1-4244-1685-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Jaekwang Kim, Jee-Hyong Lee 0001 |
A methodology for finding source-level vulnerabilities of the Linux kernel variables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: Proceedings of the International Joint Conference on Neural Networks, IJCNN 2008, part of the IEEE World Congress on Computational Intelligence, WCCI 2008, Hong Kong, China, June 1-6, 2008, pp. 3717-3722, 2008, IEEE, 978-1-4244-1820-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Nenad Jovanovic, Christopher Krügel, Engin Kirda |
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2006 IEEE Symposium on Security and Privacy (S&P 2006), 21-24 May 2006, Berkeley, California, USA, pp. 258-263, 2006, IEEE Computer Society, 0-7695-2574-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Anil Bazaz, James D. Arthur, Joseph G. Tront |
Modeling Security Vulnerabilities: A Constraints and Assumptions Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASC ![In: Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September - 1 October 2006, Indianapolis, Indiana, USA, pp. 95-102, 2006, IEEE Computer Society, 0-7695-2539-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Michael Gegick, Laurie A. Williams |
Matching attack patterns to security vulnerabilities in software-intensive system designs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 30(4), pp. 1-7, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, design, regular expression |
46 | Jedidiah R. Crandall, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong |
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 235-248, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
metamorphism, polymorphism, symbolic execution, worms, honeypots, polymorphic worms |
46 | Omar Hussain Alhazmi, Yashwant K. Malaiya, Indrajit Ray |
Security Vulnerabilities in Software Systems: A Quantitative Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings, pp. 281-294, 2005, Springer, 3-540-28138-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Richard Lippmann, Seth E. Webster, Douglas Stetson |
The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings, pp. 307-326, 2002, Springer, 3-540-00020-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Internet, network, Intrusion detection, DoS, attack, signature, worm, scan, vulnerability, probe, patch, exploit, false alarm |
44 | Muzammil Khan, Attiq Ahmed, Ahmad Raza Cheema |
Vulnerabilities of UMTS Access Domain Security Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 350-355, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
UMTS vulnerabilities, DoS attacks on UMTS, Security, UMTS |
44 | Ravishankar K. Iyer |
Security vulnerabilities: from measurements to design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 15, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
analysis of security vulnerabilities, masking techniques, runtime detection of security attacks |
44 | Jay-Evan J. Tevis, John A. Hamilton Jr. |
Static analysis of anomalies and security vulnerabilities in executable files. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 44st Annual Southeast Regional Conference, 2006, Melbourne, Florida, USA, March 10-12, 2006, pp. 560-565, 2006, ACM, 1-59593-315-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
PE format, executable file, software security vulnerabilities, static analysis |
44 | Cindy Cullen |
Internet vulnerabilities of one-time passcode mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 20th Conference on Local Computer Networks (LCN'95), Minneapolis, Minnesota, USA, October 16-19, 1995, pp. 184-186, 1995, IEEE Computer Society, 0-8186-7162-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
one-time passcode mechanisms, passive attack, one-time passcode server, hacker tools, authentication, security of data, vulnerabilities, hackers, user identification |
42 | Thomas A. Gerace, Huseyin Cavusoglu |
The critical elements of the patch management process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 52(8), pp. 117-121, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
42 | V. Benjamin Livshits, Aditya V. Nori, Sriram K. Rajamani, Anindya Banerjee 0001 |
Merlin: specification inference for explicit information flow problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLDI ![In: Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2009, Dublin, Ireland, June 15-21, 2009, pp. 75-86, 2009, ACM, 978-1-60558-392-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security analysis tools, specification inference |
42 | Mohammad Ebrahim Rafiei, Mohsen Taherian, Hamid Mousavi, Ali Movaghar 0001, Rasool Jalili |
Vulnerability Analysis in VGBPS Using Prolog. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSEN ![In: International Symposium on Fundamentals of Software Engineering, International Symposium, FSEN 2007, Tehran, Iran, April 17-19, 2007, Proceedings, pp. 404-411, 2007, Springer, 978-3-540-75697-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Protection System, Safety Problem, Prolog, Vulnerability Analysis |
42 | David Byers, Shanai Ardi, Nahid Shahmehri, Claudiu Duma |
Modeling Software VulnerabilitiesWith Vulnerability Cause Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: 22nd IEEE International Conference on Software Maintenance (ICSM 2006), 24-27 September 2006, Philadelphia, Pennsylvania, USA, pp. 411-422, 2006, IEEE Computer Society, 0-7695-2354-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
vulnerability modeling, software security |
42 | Kanta Jiwnani, Marvin V. Zelkowitz |
Maintaining Software with a Security Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: 18th International Conference on Software Maintenance (ICSM 2002), Maintaining Distributed Heterogeneous Systems, 3-6 October 2002, Montreal, Quebec, Canada, pp. 194-203, 2002, IEEE Computer Society, 0-7695-1819-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
40 | Nuno Laranjeiro, Marco Vieira, Henrique Madeira |
Protecting Database Centric Web Services against SQL/XPath Injection Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 20th International Conference, DEXA 2009, Linz, Austria, August 31 - September 4, 2009. Proceedings, pp. 271-278, 2009, Springer, 978-3-642-03572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
XPath Injection, Web services, vulnerabilities, SQL Injection, code instrumentation, security attacks |
40 | Ju An Wang, Hao Wang, Minzhe Guo, Min Xia 0004 |
Security metrics for software systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 47th Annual Southeast Regional Conference, 2009, Clemson, South Carolina, USA, March 19-21, 2009, 2009, ACM, 978-1-60558-421-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
software quality, software security, security metrics, software vulnerabilities |
40 | Kandha Sankarpandian, Travis Little, W. Keith Edwards |
Talc: using desktop graffiti to fight software vulnerability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2008 Conference on Human Factors in Computing Systems, CHI 2008, 2008, Florence, Italy, April 5-10, 2008, pp. 1055-1064, 2008, ACM, 978-1-60558-011-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
usable security, internet security, software vulnerabilities, security framework, patch management, home users, graffiti |
40 | Hasan Cavusoglu, Huseyin Cavusoglu, Srinivasan Raghunathan |
Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 33(3), pp. 171-185, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
disclosure mechanisms, responsible vulnerability disclosure, game theory, Information security, economic modeling, software vulnerabilities |
40 | Marcelo Masera, Igor Nai Fovino |
A Service-Oriented Approach for Assessing Infrastructure Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007, pp. 367-379, 2007, Springer, 978-0-387-75461-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
systemof- systems, services, attacks, vulnerabilities, threats, Security assessment |
40 | Jayamsakthi Shanmugam, M. Ponnavaikko |
Risk Mitigation for Cross Site Scripting Attacks Using Signature Based Model on the Server Side. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS ![In: Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), August 13-15, 2007, The University of Iowa, Iowa City, Iowa, USA, pp. 398-405, 2007, IEEE Computer Society, 0-7695-3039-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Application-level web Security, cross-site scripting, security vulnerabilities |
40 | Iván Arce |
The Kernel Craze. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(3), pp. 79-81, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
kernel bugs, kernel security, exploit code, vulnerabilities |
39 | Nam H. Pham, Tung Thanh Nguyen, Hoan Anh Nguyen, Xinying Wang, Anh Tuan Nguyen 0001, Tien N. Nguyen |
Detecting recurring and similar software vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE (2) ![In: Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2, ICSE 2010, Cape Town, South Africa, 1-8 May 2010, pp. 227-230, 2010, ACM. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
39 | Travis D. Breaux, Jonathan D. Lewis, Paul N. Otto, Annie I. Antón |
Identifying vulnerabilities and critical requirements using criminal court proceedings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 355-359, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
39 | Golnaz Elahi, Eric S. K. Yu, Nicola Zannone |
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ER ![In: Conceptual Modeling - ER 2009, 28th International Conference on Conceptual Modeling, Gramado, Brazil, November 9-12, 2009. Proceedings, pp. 99-114, 2009, Springer, 978-3-642-04839-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
39 | Zhiqiang Lin, Xiangyu Zhang 0001, Dongyan Xu |
Convicting exploitable software vulnerabilities: An efficient input provenance based approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: The 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2008, June 24-27, 2008, Anchorage, Alaska, USA, Proceedings, pp. 247-256, 2008, IEEE Computer Society, 978-1-4244-2397-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Sheraz Naseer, Muhammad Younus, Attiq Ahmed |
Vulnerabilities Exposing IEEE 802.16e Networks to DoS Attacks: A Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 344-349, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IEEE 802.16e security, Multi- and broadcast service shared key vulnerability, WiMAX, DoS Attacks |
39 | Babak Salamat, Andreas Gal, Todd Jackson, Karthikeyan Manivannan, Gregor Wagner, Michael Franz |
Multi-variant Program Execution: Using Multi-core Systems to Defuse Buffer-Overflow Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIS ![In: Second International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2008), March 4th-7th, 2008, Technical University of Catalonia, Barcelona, Spain, pp. 843-848, 2008, IEEE Computer Society, 978-0-7695-3109-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Taeshik Shon, Wook Choi |
An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: Network-Based Information Systems, First International Conference, NBiS 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, pp. 88-97, 2007, Springer, 978-3-540-74572-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | JeongWook Kim, Hyug-Hyun Cho, Gil-Jong Mun, Jae-Hyun Seo, Bong-Nam Noh, Yongmin Kim 0005 |
Experiments and Countermeasures of Security Vulnerabilities on Next Generation Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (2) ![In: Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings, pp. 559-564, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Anil Bazaz, James D. Arthur |
Towards a Taxonomy of Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 163, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Matthew Van Gundy, Hao Chen 0003, Zhendong Su 0001, Giovanni Vigna |
Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 23rd Annual Computer Security Applications Conference (ACSAC 2007), December 10-14, 2007, Miami Beach, Florida, USA, pp. 74-85, 2007, IEEE Computer Society, 0-7695-3060-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Zhiqiang Lin, Bing Mao, Li Xie 0001 |
A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 348-357, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Dave Ahmad |
The Rising Threat of Vulnerabilities Due to Integer Errors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(4), pp. 77-82, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
39 | Robert A. Martin |
Managing Vulnerabilities in Networked Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 34(11), pp. 32-38, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
37 | Daniela E. Popescu, Marcela F. Prada |
About the Buildings' Danger Control Systems Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part III, pp. 650-657, 2008, Springer, 978-3-540-85566-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
programmable outputs, testability, vulnerabilities, security system |
37 | Mohamed K. Saad, Syed V. Ahamed |
Vulnerabilities of RFID systems in infant abduction protection and patient wander prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGCSE Bull. ![In: ACM SIGCSE Bull. 39(2), pp. 160-165, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
infant abduction, RFID, vulnerabilities, protection |
37 | Jayamsakthi Shanmugam, M. Ponnavaikko |
A solution to block Cross Site Scripting Vulnerabilities based on Service Oriented Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 11-13 July 2007, Melbourne, Australia, pp. 861-866, 2007, IEEE Computer Society, 0-7695-2841-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Application-level web Security, cross-site scripting, security vulnerabilities |
35 | Asmaa Adnane, Christophe Bidan, Rafael Timóteo de Sousa Júnior |
Trust-Based Countermeasures for Securing OLSR Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (2) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 745-752, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Mary Lou Soffa |
Path Sensitive Analysis for Security Flaws. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 11th IEEE High Assurance Systems Engineering Symposium, HASE 2008, Nanjing, China, December 3 - 5, 2008, pp. 3, 2008, IEEE Computer Society, 978-0-7695-3482-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Alexander M. Hoole, Issa Traoré |
Contract-Based Security Monitors for Service Oriented Software Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 1239-1245, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Jinyoo Kim, Yashwant K. Malaiya, Indrakshi Ray |
Vulnerability Discovery in Multi-Version Software Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), November 14-16, 2007, Dallas, Texas, USA, pp. 141-148, 2007, IEEE Computer Society, 0-7695-3043-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Stefan Kals, Engin Kirda, Christopher Krügel, Nenad Jovanovic |
SecuBat: a web vulnerability scanner. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 15th international conference on World Wide Web, WWW 2006, Edinburgh, Scotland, UK, May 23-26, 2006, pp. 247-256, 2006, ACM, 1-59593-323-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
automated vulnerability detection, security, crawling, SQL injection, XSS, cross-site scripting, scanner |
35 | Ben Breech, Lori L. Pollock |
A framework for testing security mechanisms for program-based attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 30(4), pp. 1-7, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Haitao Tian, Liusheng Huang, Zhi Zhou, Yonglong Luo |
Arm up Administrators: Automated Vulnerability Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPAN ![In: 7th International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN 2004), 10-12 May 2004, Hong Kong, SAR, China, pp. 587-593, 2004, IEEE Computer Society, 0-7695-2135-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Michael Dalton, Hari Kannan, Christos Kozyrakis |
Raksha: a flexible information flow architecture for software security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCA ![In: 34th International Symposium on Computer Architecture (ISCA 2007), June 9-13, 2007, San Diego, California, USA, pp. 482-493, 2007, ACM, 978-1-59593-706-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
semantic vulnerabilities, dynamic, software security |
32 | Dzintars Avots, Michael Dalton, V. Benjamin Livshits, Monica S. Lam |
Improving software security with a C pointer analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 27th International Conference on Software Engineering (ICSE 2005), 15-21 May 2005, St. Louis, Missouri, USA, pp. 332-341, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
format string violations, security aws, program analysis, programming languages, error detection, dynamic analysis, vulnerabilities, buffer overflows, software security, pointer analysis, context-sensitive, type safety, software errors |
32 | Christian Rinderknecht |
Proving a Soundness Property for the Joint Design of ASN.1 and the Basic Encoding Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAM ![In: System Analysis and Modeling, 4th International SDL and MSC Workshop, SAM 2004, Ottawa, Canada, June 1-4, 2004, Revised Selected Papers, pp. 154-170, 2004, Springer, 3-540-24561-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Abstract Syntax Notation One, Basic Encoding Rules, formal methods, protocol, specification, vulnerabilities, BER, ASN.1 |
32 | John Viega, J. T. Bloch, Y. Kohno, Gary McGraw |
ITS4: A Static Vulnerability Scanner for C and C++ Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 257-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
ITS4, static vulnerability scanner, C++ code, security-critical source code, real-time feedback, e-commerce software, software tools, security of data, software packages, software package, C language, software vulnerabilities, C++ language, C code |
32 | Rodolphe Ortalo, Yves Deswarte, Mohamed Kaâniche |
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 25(5), pp. 633-650, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
operational vulnerabilities, privilege graph, quantitative evaluation, Security assessment |
32 | Calvin Ko, Manfred Ruschitzka, Karl N. Levitt |
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 175-187, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
security-critical program execution monitoring, specification-based approach, program vulnerabilities, security specifications, real-time intrusion detection system, Unix setuid root programs, system attack detection, security violations, distributed systems, synchronization, system monitoring, audit trails, formal framework |
32 | Hossain Shahriar, Mohammad Zulkernine |
Automatic Testing of Program Security Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 2, pp. 550-555, 2009, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Lutz Lowis, Rafael Accorsi |
On a Classification Approach for SOA Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 2, pp. 439-444, 2009, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
32 | José Fonseca 0002, Marco Vieira |
Mapping software faults with web security vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: The 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2008, June 24-27, 2008, Anchorage, Alaska, USA, Proceedings, pp. 257-266, 2008, IEEE Computer Society, 978-1-4244-2397-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | David Byers, Nahid Shahmehri |
A Cause-Based Approach to Preventing Software Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 276-283, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Security modeling, Software security |
32 | Pierre Parrend, Stéphane Frénot |
Classification of Component Vulnerabilities in Java Service Oriented Programming (SOP) Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CBSE ![In: Component-Based Software Engineering, 11th International Symposium, CBSE 2008, Karlsruhe, Germany, October 14-17, 2008. Proceedings, pp. 80-96, 2008, Springer, 978-3-540-87890-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Wenjun Gu, Zhimin Yang, Can Que, Dong Xuan, Weijia Jia 0001 |
On Security Vulnerabilities of Null Data Frames in IEEE 802.11 Based WLANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 17-20 June 2008, Beijing, China, pp. 28-35, 2008, IEEE Computer Society, 978-0-7695-3172-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Alaeddine El Fawal, Jean-Yves Le Boudec, Kavé Salamatian |
Vulnerabilities in Epidemic Forwarding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOWMOM ![In: 2007 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2007), 18-21 June 2007, Helsinki, Finland, Proceedings, pp. 1-6, 2007, IEEE Computer Society, 1-4244-0992-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Weidong Cui, Marcus Peinado, Helen J. Wang, Michael E. Locasto |
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pp. 252-266, 2007, IEEE Computer Society, 0-7695-2848-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Cyril Onwubiko, Andrew P. Lenaghan |
Managing Security Threats and Vulnerabilities for Small to Medium Enterprises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings, pp. 244-249, 2007, IEEE, 1-4244-1329-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Niranjan Soundararajan, Angshuman Parashar, Anand Sivasubramaniam |
Mechanisms for bounding vulnerabilities of processor structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCA ![In: 34th International Symposium on Computer Architecture (ISCA 2007), June 9-13, 2007, San Diego, California, USA, pp. 506-515, 2007, ACM, 978-1-59593-706-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
redundant threading, microarchitecture, transient faults |
32 | Ashish Aggarwal, Pankaj Jalote |
Integrating Static and Dynamic Analysis for Detecting Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: 30th Annual International Computer Software and Applications Conference, COMPSAC 2006, Chicago, Illinois, USA, September 17-21, 2006. Volume 1, pp. 343-350, 2006, IEEE Computer Society, 0-7695-2655-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Nenad Jovanovic, Christopher Kruegel, Engin Kirda |
Precise alias analysis for static detection of web application vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, PLAS 2006, Ottawa, Ontario, Canada, June 10, 2006, pp. 27-36, 2006, ACM, 1-59593-374-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
scripting languages security, static analysis, program analysis, data flow analysis, PHP, alias analysis, cross-site scripting, web application security |
32 | Jun Xu 0003, Peng Ning, Chongkyung Kil, Yan Zhai, Christopher Bookholt |
Automatic diagnosis and response to memory corruption vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 223-234, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
attack diagnosis, memory corruption attack, randomization, message filtering |
32 | Rui Costa Cardoso, Mário M. Freire |
Towards Autonomic Minimization of Security Vulnerabilities Exploitation in Hybrid Network Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAS/ICNS ![In: Joint International Conference on Autonomic and Autonomous Systems 2005 / International Conference on Networking and Services 2005, ICAS/ICNS 2005, Papeete, Tahiti, France, October 23-28, 2005, pp. 80, 2005, IEEE Computer Society, 0-7695-2450-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Annie I. Antón, Julia Brande Earp |
A requirements taxonomy for reducing Web site privacy vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Requir. Eng. ![In: Requir. Eng. 9(3), pp. 169-185, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Security requirements, Privacy requirements |
32 | Jay-Evan J. Tevis, John A. Hamilton Jr. |
Methods for the prevention, detection and removal of software security vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 42nd Annual Southeast Regional Conference, 2004, Huntsville, Alabama, USA, April 2-3, 2004, pp. 197-202, 2004, ACM, 1-58113-870-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
functional programming, static code analysis |
32 | Giuseppe A. Di Lucca, Anna Rita Fasolino, M. Mastoianni, Porfirio Tramontana |
Identifying Cross Site Scripting Vulnerabilities in Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSE ![In: 6th International Workshop on Web Site Evolution (WSE 2004) - Testing, 11 September 2004, Chicago, IL, USA, pp. 71-80, 2004, IEEE Computer Society, 0-7695-2224-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Martin C. Rinard, Cristian Cadar, Daniel Dumitran, Daniel M. Roy 0001, Tudor Leu |
A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA, pp. 82-90, 2004, IEEE Computer Society, 0-7695-2252-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Ravishankar K. Iyer, Shuo Chen 0001, Jun Xu 0003, Zbigniew Kalbarczyk |
Security Vulnerabilities - From Data Analysis to Protection Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORDS Fall ![In: 9th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS Fall 2003), 1-3 October 2003, Anacapri (Capri Island), Italy, pp. 331-338, 2003, IEEE Computer Society, 0-7695-2054-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
32 | Ronald W. Ritchey, Paul Ammann |
Using Model Checking to Analyze Network Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, 2000, pp. 156-165, 2000, IEEE Computer Society, 0-7695-0665-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
29 | John Diamant |
Resilient Security Architecture: A Complementary Approach to Reducing Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 9(4), pp. 80-84, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
HP Comprehensive Applications Threat Analysis, W. Edwards Deming, dynamic application security testing, static application security testing, security requirements gap analysis, architectural threat analysis, security quality, zero day, 0-day, software development, security and privacy, security vulnerabilities |
29 | Thomas Zimmermann 0001, Nachiappan Nagappan, Laurie A. Williams |
Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICST ![In: Third International Conference on Software Testing, Verification and Validation, ICST 2010, Paris, France, April 7-9, 2010, pp. 421-428, 2010, IEEE Computer Society, 978-0-7695-3990-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Complexity, Metrics, Prediction, Dependencies, Coverage, Vulnerabilities, Organizational Structure, Churn |
29 | Nuno Seixas, José Fonseca 0002, Marco Vieira, Henrique Madeira |
Looking at Web Security Vulnerabilities from the Programming Language Perspective: A Field Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSRE ![In: ISSRE 2009, 20th International Symposium on Software Reliability Engineering, Mysuru, Karnataka, India, 16-19 November 2009, pp. 129-135, 2009, IEEE Computer Society, 978-0-7695-3878-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
programming languages, field study, software faults, Security vulnerabilities |
29 | Eugene H. Spafford |
Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIPS ![In: Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers, pp. 20-33, 2008, Springer, 978-3-642-10232-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security policy, vulnerabilities, patching, cyber security, security education |
Displaying result #1 - #100 of 4178 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|