The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for vulnerabilities with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1990 (15) 1991-1998 (23) 1999-2000 (28) 2001 (32) 2002 (54) 2003 (93) 2004 (127) 2005 (198) 2006 (187) 2007 (249) 2008 (268) 2009 (190) 2010 (99) 2011 (93) 2012 (94) 2013 (90) 2014 (107) 2015 (135) 2016 (160) 2017 (167) 2018 (198) 2019 (254) 2020 (247) 2021 (268) 2022 (331) 2023 (377) 2024 (94)
Publication types (Num. hits)
article(1313) book(3) data(2) incollection(22) inproceedings(2772) phdthesis(66)
Venues (Conferences, Journals, ...)
CoRR(393) CCS(74) USENIX Security Symposium(66) ACSAC(53) ARES(44) Comput. Secur.(43) HICSS(41) IEEE Secur. Priv.(41) IEEE Access(37) DSN(34) AsiaCCS(32) NDSS(32) ICSE(27) ASE(26) SAC(26) RAID(23) More (+10 of total 1365)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1767 occurrences of 913 keywords

Results
Found 4178 publication records. Showing 4178 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
89Jon Heffley, Pascal Meunier Can Source Code Auditing Software Identify Common Vulnerabilities and Be Used to Evaluate Software Security? Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
86Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker Beyond heuristics: learning to classify vulnerabilities and predict exploits. Search on Bibsonomy KDD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF SVM, supervised learning, vulnerabilities, exploits
79Hossain Shahriar, Mohammad Zulkernine Mutation-Based Testing of Buffer Overflow Vulnerabilities. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Mutation-based testing, Vulnerabilities, Buffer overflow
79Shuo Chen 0001, Zbigniew Kalbarczyk, Jun Xu 0003, Ravishankar K. Iyer A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities. Search on Bibsonomy DSN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF data analysis, security vulnerabilities, finite state machine modeling
75Anil Sharma, Jason R. Martin, Nitin Anand, Michel Cukier, William H. Sanders Ferret: A Host Vulnerability Checking Tool. Search on Bibsonomy PRDC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Security auditing tool, host vulnerabilities, security evaluation
74Matin Tamizi, Matt Weinstein, Michel Cukier Automated Checking for Windows Host Vulnerabilities. Search on Bibsonomy ISSRE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
67Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu 0003 Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF memory corruption, debugging, vulnerability analysis
60Istehad Chowdhury, Mohammad Zulkernine Can complexity, coupling, and cohesion metrics be used as early indicators of vulnerabilities? Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security, complexity, empirical study, software metrics, coupling, vulnerability, software security, cohesion
60Gary Wassermann, Zhendong Su 0001 Static detection of cross-site scripting vulnerabilities. Search on Bibsonomy ICSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF static analysis, web applications, cross-site scripting, input validation
60Sung-Whan Woo, Omar Hussain Alhazmi, Yashwant K. Malaiya Assessing Vulnerabilities in Apache and IIS HTTP Servers. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
56Shuo Chen, Hong Chen, Manuel Caballero Residue objects: a challenge to web browser security. Search on Bibsonomy EuroSys The full citation details ... 2010 DBLP  DOI  BibTeX  RDF component object model (com), residue object, browser security
56Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili, Reza Zakeri, Ali Reza Omidian Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG). Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
55Pranith D. Kumar, Anchal Nema, Rajeev Kumar Hybrid analysis of executables to detect security vulnerabilities: security vulnerabilities. Search on Bibsonomy ISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hybrid analysis, instrumentation, slicing, security vulnerabilities, memory errors
53Kaarina Karppinen, Lyly Yonkwa, Mikael Lindvall Why Developers Insert Security Vulnerabilities into Their Code. Search on Bibsonomy ACHI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
53Kwangsun Ko, Insook Jang, Yong-hyeog Kang, JinSeok Lee, Young Ik Eom Characteristic Classification and Correlation Analysis of Source-Level Vulnerabilities in the Linux Kernel. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51Steve Wood, Gordon W. Romney Protection methods against IP packet attacks. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF TCP vulnerabilities, UDP vulnerabilities, packet inspection, intrusion detection systems, firewalls, access control list, intrusion prevention systems
51K. Sivakumar, K. Garg Constructing a "Common Cross Site Scripting Vulnerabilities Enumeration (CXE)" Using CWE and CVE. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Secure code, PHP Vulnerabilities, CWE, CVE, Web Security, XSS
51Greg Goth Functionality Meets Terminology to Address Network Security Vulnerabilities. Search on Bibsonomy IEEE Distributed Syst. Online The full citation details ... 2006 DBLP  DOI  BibTeX  RDF network security vulnerabilities, computer security
49Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan An OVAL-based active vulnerability assessment system for enterprise computer networks. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Open vulnerability assessment language, Attack path, Network security, Relational database management system, Predicate logic, Security vulnerability
49Aaron Steele Ontological Vulnerability Assessment. Search on Bibsonomy WISE Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
47Yao-Wen Huang, Fang Yu 0001, Christian Hang, Chung-Hung Tsai, Der-Tsai Lee, Sy-Yen Kuo Securing web application code by static analysis and runtime protection. Search on Bibsonomy WWW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF program security, verification, type systems, information flow, noninterference, web application security, security vulnerabilities
46Pierre Parrend Enhancing Automated Detection of Vulnerabilities in Java Components. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
46Nuno Antunes, Nuno Laranjeiro, Marco Vieira, Henrique Madeira Effective Detection of SQL/XPath Injection Vulnerabilities in Web Services. Search on Bibsonomy IEEE SCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
46Yonesy F. Nunez Maximizing an Organization's Information Security Posture by Distributedly Assessing and Remedying System Vulnerabilities. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Jaekwang Kim, Jee-Hyong Lee 0001 A methodology for finding source-level vulnerabilities of the Linux kernel variables. Search on Bibsonomy IJCNN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Nenad Jovanovic, Christopher Krügel, Engin Kirda Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
46Anil Bazaz, James D. Arthur, Joseph G. Tront Modeling Security Vulnerabilities: A Constraints and Assumptions Perspective. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
46Michael Gegick, Laurie A. Williams Matching attack patterns to security vulnerabilities in software-intensive system designs. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, design, regular expression
46Jedidiah R. Crandall, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF metamorphism, polymorphism, symbolic execution, worms, honeypots, polymorphic worms
46Omar Hussain Alhazmi, Yashwant K. Malaiya, Indrajit Ray Security Vulnerabilities in Software Systems: A Quantitative Perspective. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
46Richard Lippmann, Seth E. Webster, Douglas Stetson The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Internet, network, Intrusion detection, DoS, attack, signature, worm, scan, vulnerability, probe, patch, exploit, false alarm
44Muzammil Khan, Attiq Ahmed, Ahmad Raza Cheema Vulnerabilities of UMTS Access Domain Security Architecture. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF UMTS vulnerabilities, DoS attacks on UMTS, Security, UMTS
44Ravishankar K. Iyer Security vulnerabilities: from measurements to design. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF analysis of security vulnerabilities, masking techniques, runtime detection of security attacks
44Jay-Evan J. Tevis, John A. Hamilton Jr. Static analysis of anomalies and security vulnerabilities in executable files. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF PE format, executable file, software security vulnerabilities, static analysis
44Cindy Cullen Internet vulnerabilities of one-time passcode mechanisms. Search on Bibsonomy LCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF one-time passcode mechanisms, passive attack, one-time passcode server, hacker tools, authentication, security of data, vulnerabilities, hackers, user identification
42Thomas A. Gerace, Huseyin Cavusoglu The critical elements of the patch management process. Search on Bibsonomy Commun. ACM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
42V. Benjamin Livshits, Aditya V. Nori, Sriram K. Rajamani, Anindya Banerjee 0001 Merlin: specification inference for explicit information flow problems. Search on Bibsonomy PLDI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security analysis tools, specification inference
42Mohammad Ebrahim Rafiei, Mohsen Taherian, Hamid Mousavi, Ali Movaghar 0001, Rasool Jalili Vulnerability Analysis in VGBPS Using Prolog. Search on Bibsonomy FSEN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Protection System, Safety Problem, Prolog, Vulnerability Analysis
42David Byers, Shanai Ardi, Nahid Shahmehri, Claudiu Duma Modeling Software VulnerabilitiesWith Vulnerability Cause Graphs. Search on Bibsonomy ICSM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF vulnerability modeling, software security
42Kanta Jiwnani, Marvin V. Zelkowitz Maintaining Software with a Security Perspective. Search on Bibsonomy ICSM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
40Nuno Laranjeiro, Marco Vieira, Henrique Madeira Protecting Database Centric Web Services against SQL/XPath Injection Attacks. Search on Bibsonomy DEXA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF XPath Injection, Web services, vulnerabilities, SQL Injection, code instrumentation, security attacks
40Ju An Wang, Hao Wang, Minzhe Guo, Min Xia 0004 Security metrics for software systems. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF software quality, software security, security metrics, software vulnerabilities
40Kandha Sankarpandian, Travis Little, W. Keith Edwards Talc: using desktop graffiti to fight software vulnerability. Search on Bibsonomy CHI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF usable security, internet security, software vulnerabilities, security framework, patch management, home users, graffiti
40Hasan Cavusoglu, Huseyin Cavusoglu, Srinivasan Raghunathan Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF disclosure mechanisms, responsible vulnerability disclosure, game theory, Information security, economic modeling, software vulnerabilities
40Marcelo Masera, Igor Nai Fovino A Service-Oriented Approach for Assessing Infrastructure Security. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF systemof- systems, services, attacks, vulnerabilities, threats, Security assessment
40Jayamsakthi Shanmugam, M. Ponnavaikko Risk Mitigation for Cross Site Scripting Attacks Using Signature Based Model on the Server Side. Search on Bibsonomy IMSCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Application-level web Security, cross-site scripting, security vulnerabilities
40Iván Arce The Kernel Craze. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF kernel bugs, kernel security, exploit code, vulnerabilities
39Nam H. Pham, Tung Thanh Nguyen, Hoan Anh Nguyen, Xinying Wang, Anh Tuan Nguyen 0001, Tien N. Nguyen Detecting recurring and similar software vulnerabilities. Search on Bibsonomy ICSE (2) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
39Travis D. Breaux, Jonathan D. Lewis, Paul N. Otto, Annie I. Antón Identifying vulnerabilities and critical requirements using criminal court proceedings. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
39Golnaz Elahi, Eric S. K. Yu, Nicola Zannone A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations. Search on Bibsonomy ER The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
39Zhiqiang Lin, Xiangyu Zhang 0001, Dongyan Xu Convicting exploitable software vulnerabilities: An efficient input provenance based approach. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Sheraz Naseer, Muhammad Younus, Attiq Ahmed Vulnerabilities Exposing IEEE 802.16e Networks to DoS Attacks: A Survey. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IEEE 802.16e security, Multi- and broadcast service shared key vulnerability, WiMAX, DoS Attacks
39Babak Salamat, Andreas Gal, Todd Jackson, Karthikeyan Manivannan, Gregor Wagner, Michael Franz Multi-variant Program Execution: Using Multi-core Systems to Defuse Buffer-Overflow Vulnerabilities. Search on Bibsonomy CISIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Taeshik Shon, Wook Choi An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions. Search on Bibsonomy NBiS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39JeongWook Kim, Hyug-Hyun Cho, Gil-Jong Mun, Jae-Hyun Seo, Bong-Nam Noh, Yongmin Kim 0005 Experiments and Countermeasures of Security Vulnerabilities on Next Generation Network. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39Anil Bazaz, James D. Arthur Towards a Taxonomy of Vulnerabilities. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39Matthew Van Gundy, Hao Chen 0003, Zhendong Su 0001, Giovanni Vigna Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39Zhiqiang Lin, Bing Mao, Li Xie 0001 A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
39Dave Ahmad The Rising Threat of Vulnerabilities Due to Integer Errors. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
39Robert A. Martin Managing Vulnerabilities in Networked Systems. Search on Bibsonomy Computer The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
37Daniela E. Popescu, Marcela F. Prada About the Buildings' Danger Control Systems Vulnerabilities. Search on Bibsonomy KES (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF programmable outputs, testability, vulnerabilities, security system
37Mohamed K. Saad, Syed V. Ahamed Vulnerabilities of RFID systems in infant abduction protection and patient wander prevention. Search on Bibsonomy ACM SIGCSE Bull. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF infant abduction, RFID, vulnerabilities, protection
37Jayamsakthi Shanmugam, M. Ponnavaikko A solution to block Cross Site Scripting Vulnerabilities based on Service Oriented Architecture. Search on Bibsonomy ACIS-ICIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Application-level web Security, cross-site scripting, security vulnerabilities
35Asmaa Adnane, Christophe Bidan, Rafael Timóteo de Sousa Júnior Trust-Based Countermeasures for Securing OLSR Protocol. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Mary Lou Soffa Path Sensitive Analysis for Security Flaws. Search on Bibsonomy HASE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Alexander M. Hoole, Issa Traoré Contract-Based Security Monitors for Service Oriented Software Architecture. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Jinyoo Kim, Yashwant K. Malaiya, Indrakshi Ray Vulnerability Discovery in Multi-Version Software Systems. Search on Bibsonomy HASE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Stefan Kals, Engin Kirda, Christopher Krügel, Nenad Jovanovic SecuBat: a web vulnerability scanner. Search on Bibsonomy WWW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF automated vulnerability detection, security, crawling, SQL injection, XSS, cross-site scripting, scanner
35Ben Breech, Lori L. Pollock A framework for testing security mechanisms for program-based attacks. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Haitao Tian, Liusheng Huang, Zhi Zhou, Yonglong Luo Arm up Administrators: Automated Vulnerability Management. Search on Bibsonomy ISPAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Michael Dalton, Hari Kannan, Christos Kozyrakis Raksha: a flexible information flow architecture for software security. Search on Bibsonomy ISCA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF semantic vulnerabilities, dynamic, software security
32Dzintars Avots, Michael Dalton, V. Benjamin Livshits, Monica S. Lam Improving software security with a C pointer analysis. Search on Bibsonomy ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF format string violations, security aws, program analysis, programming languages, error detection, dynamic analysis, vulnerabilities, buffer overflows, software security, pointer analysis, context-sensitive, type safety, software errors
32Christian Rinderknecht Proving a Soundness Property for the Joint Design of ASN.1 and the Basic Encoding Rules. Search on Bibsonomy SAM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Abstract Syntax Notation One, Basic Encoding Rules, formal methods, protocol, specification, vulnerabilities, BER, ASN.1
32John Viega, J. T. Bloch, Y. Kohno, Gary McGraw ITS4: A Static Vulnerability Scanner for C and C++ Code. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF ITS4, static vulnerability scanner, C++ code, security-critical source code, real-time feedback, e-commerce software, software tools, security of data, software packages, software package, C language, software vulnerabilities, C++ language, C code
32Rodolphe Ortalo, Yves Deswarte, Mohamed Kaâniche Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF operational vulnerabilities, privilege graph, quantitative evaluation, Security assessment
32Calvin Ko, Manfred Ruschitzka, Karl N. Levitt Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF security-critical program execution monitoring, specification-based approach, program vulnerabilities, security specifications, real-time intrusion detection system, Unix setuid root programs, system attack detection, security violations, distributed systems, synchronization, system monitoring, audit trails, formal framework
32Hossain Shahriar, Mohammad Zulkernine Automatic Testing of Program Security Vulnerabilities. Search on Bibsonomy COMPSAC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Lutz Lowis, Rafael Accorsi On a Classification Approach for SOA Vulnerabilities. Search on Bibsonomy COMPSAC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32José Fonseca 0002, Marco Vieira Mapping software faults with web security vulnerabilities. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32David Byers, Nahid Shahmehri A Cause-Based Approach to Preventing Software Vulnerabilities. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security modeling, Software security
32Pierre Parrend, Stéphane Frénot Classification of Component Vulnerabilities in Java Service Oriented Programming (SOP) Platforms. Search on Bibsonomy CBSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Wenjun Gu, Zhimin Yang, Can Que, Dong Xuan, Weijia Jia 0001 On Security Vulnerabilities of Null Data Frames in IEEE 802.11 Based WLANs. Search on Bibsonomy ICDCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Alaeddine El Fawal, Jean-Yves Le Boudec, Kavé Salamatian Vulnerabilities in Epidemic Forwarding. Search on Bibsonomy WOWMOM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Weidong Cui, Marcus Peinado, Helen J. Wang, Michael E. Locasto ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Cyril Onwubiko, Andrew P. Lenaghan Managing Security Threats and Vulnerabilities for Small to Medium Enterprises. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Niranjan Soundararajan, Angshuman Parashar, Anand Sivasubramaniam Mechanisms for bounding vulnerabilities of processor structures. Search on Bibsonomy ISCA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF redundant threading, microarchitecture, transient faults
32Ashish Aggarwal, Pankaj Jalote Integrating Static and Dynamic Analysis for Detecting Vulnerabilities. Search on Bibsonomy COMPSAC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Nenad Jovanovic, Christopher Kruegel, Engin Kirda Precise alias analysis for static detection of web application vulnerabilities. Search on Bibsonomy PLAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF scripting languages security, static analysis, program analysis, data flow analysis, PHP, alias analysis, cross-site scripting, web application security
32Jun Xu 0003, Peng Ning, Chongkyung Kil, Yan Zhai, Christopher Bookholt Automatic diagnosis and response to memory corruption vulnerabilities. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF attack diagnosis, memory corruption attack, randomization, message filtering
32Rui Costa Cardoso, Mário M. Freire Towards Autonomic Minimization of Security Vulnerabilities Exploitation in Hybrid Network Environments. Search on Bibsonomy ICAS/ICNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Annie I. Antón, Julia Brande Earp A requirements taxonomy for reducing Web site privacy vulnerabilities. Search on Bibsonomy Requir. Eng. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Security requirements, Privacy requirements
32Jay-Evan J. Tevis, John A. Hamilton Jr. Methods for the prevention, detection and removal of software security vulnerabilities. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF functional programming, static code analysis
32Giuseppe A. Di Lucca, Anna Rita Fasolino, M. Mastoianni, Porfirio Tramontana Identifying Cross Site Scripting Vulnerabilities in Web Applications. Search on Bibsonomy WSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Martin C. Rinard, Cristian Cadar, Daniel Dumitran, Daniel M. Roy 0001, Tudor Leu A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors). Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Ravishankar K. Iyer, Shuo Chen 0001, Jun Xu 0003, Zbigniew Kalbarczyk Security Vulnerabilities - From Data Analysis to Protection Mechanisms. Search on Bibsonomy WORDS Fall The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
32Ronald W. Ritchey, Paul Ammann Using Model Checking to Analyze Network Vulnerabilities. Search on Bibsonomy S&P The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
29John Diamant Resilient Security Architecture: A Complementary Approach to Reducing Vulnerabilities. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF HP Comprehensive Applications Threat Analysis, W. Edwards Deming, dynamic application security testing, static application security testing, security requirements gap analysis, architectural threat analysis, security quality, zero day, 0-day, software development, security and privacy, security vulnerabilities
29Thomas Zimmermann 0001, Nachiappan Nagappan, Laurie A. Williams Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista. Search on Bibsonomy ICST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Complexity, Metrics, Prediction, Dependencies, Coverage, Vulnerabilities, Organizational Structure, Churn
29Nuno Seixas, José Fonseca 0002, Marco Vieira, Henrique Madeira Looking at Web Security Vulnerabilities from the Programming Language Perspective: A Field Study. Search on Bibsonomy ISSRE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF programming languages, field study, software faults, Security vulnerabilities
29Eugene H. Spafford Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense. Search on Bibsonomy ISIPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security policy, vulnerabilities, patching, cyber security, security education
Displaying result #1 - #100 of 4178 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license