The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Vulnerability with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1986 (16) 1987-1992 (26) 1993-1996 (27) 1997-1998 (23) 1999-2000 (30) 2001 (24) 2002 (56) 2003 (86) 2004 (146) 2005 (196) 2006 (227) 2007 (250) 2008 (259) 2009 (209) 2010 (169) 2011 (137) 2012 (165) 2013 (198) 2014 (207) 2015 (226) 2016 (251) 2017 (257) 2018 (342) 2019 (424) 2020 (484) 2021 (581) 2022 (612) 2023 (775) 2024 (155)
Publication types (Num. hits)
article(2504) book(8) data(4) incollection(62) inproceedings(3886) phdthesis(73) proceedings(21)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1664 occurrences of 928 keywords

Results
Found 6558 publication records. Showing 6558 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
37Pavel Propastin Monitoring System for Assessment of Vegetation Sensitivity to El-Niño over Africa. Search on Bibsonomy AGILE Conf. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Mary Lou Soffa Path Sensitive Analysis for Security Flaws. Search on Bibsonomy HASE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Pierre Parrend, Stéphane Frénot Classification of Component Vulnerabilities in Java Service Oriented Programming (SOP) Platforms. Search on Bibsonomy CBSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Eun-Jung Choi, Hyung-Jong Kim, Myuhng Joo Kim DMKB : A Defense Mechanism Knowledge Base. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
37Robert J. Kauffman, Mani R. Subramani, Charles A. Wood Analyzing Information Intermediaries in Electronic Brokerage. Search on Bibsonomy HICSS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
37Jochen Liedtke A Short Note on Small Virtually-Addresses Control Blocks. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
37Pu Li, H. Raghav Rao An examination of private intermediaries' roles in software vulnerabilities disclosure. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Private intermediary, Disclosure, Software vulnerability
37Young-Hwan Bang, Yoon-Jung Jung, In-Jung Kim, Namhoon Lee, Gang-Soo Lee The Design and Development for Risk Analysis Automatic Tool. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Safeguard, Vulnerability, Risk Analysis, Interview, Threat, Asset, Inquiry
37Richard Lippmann, Seth E. Webster, Douglas Stetson The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Internet, network, Intrusion detection, DoS, attack, signature, worm, scan, vulnerability, probe, patch, exploit, false alarm
36Salim Hariri, Guangzhi Qu, Tushneem Dharmagadda, Modukuri Ramkishore, Cauligi S. Raghavendra Impact Analysis of Faults and Attacks in Large-Scale Networks. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF vulnerability index, vulnerability metrics, component impact factor, system impact factor
32Pradip De, Yonghe Liu, Sajal K. Das 0001 An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols in Wireless Sensor Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Vilas Sridharan, David R. Kaeli Eliminating microarchitectural dependency from Architectural Vulnerability. Search on Bibsonomy HPCA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Juan Caballero, Zhenkai Liang, Pongsin Poosankam, Dawn Song Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon Enright, Stefan Savage When private keys are public: results from the 2008 Debian OpenSSL vulnerability. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF debian, openssl, entropy, survey, attacks, prng
32Omar Hussain Alhazmi, Yashwant K. Malaiya Application of Vulnerability Discovery Models to Major Operating Systems. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Maxwell G. Dondo A Vulnerability Prioritization System Using A Fuzzy Risk Analysis Approach. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Gang Zhao, Hua Chen, Dongxia Wang Data-Flow Based Analysis of Java Bytecode Vulnerability. Search on Bibsonomy WAIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Patrick Tague, David Slater, Jason Rogers, Radha Poovendran Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Chunlei Fu, Li Fu Comprehensive Assessment Model of Network Vulnerability Based upon Refined Mealy Automata. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Syed Zafar Shazli, Mehdi Baradaran Tahoori Obtaining Microprocessor Vulnerability Factor Using Formal Methods. Search on Bibsonomy DFT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Ha-Thanh Le, Peter Kok Keong Loh Evaluating AVDL descriptions for web application vulnerability analysis. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Sun-Myung Hwang A Vulnerability Check in System Block. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Peter Mell, Karen Scarfone, Sasha Romanosky Common Vulnerability Scoring System. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Xin Fu, James Poe, Tao Li, José A. B. Fortes Characterizing Microarchitecture Soft Error Vulnerability Phase Behavior. Search on Bibsonomy MASCOTS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Geuk Lee, Il Seok Ko, Tai-Hoon Kim A Vulnerability Assessment Tool Based on OVAL in System Block Model. Search on Bibsonomy ICIC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Hyungwoo Kang, Kibom Kim, Soon Jwa Hong, Dong Hoon Lee 0001 A Model for Security Vulnerability Pattern. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Abstract Syntax Tree (AST), Static analysis, Buffer overflow, Software security, Pushdown Automata (PDA)
32Dong Chun Lee Analysis of Security Vulnerability Diagnosis in Mobile IP Networks. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Omar Hussain Alhazmi, Yashwant K. Malaiya Modeling the Vulnerability Discovery Process. Search on Bibsonomy ISSRE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Byoung-Muk Min, Sok-Pal Cho, Hong-Jin Kim, Dong Chun Lee System Development of Security Vulnerability Diagnosis in Wireless Internet Networks. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Youngmi Kwon, Hui Jae Lee, Geuk Lee A Vulnerability Assessment Tool Based on OVAL in Linux System. Search on Bibsonomy NPC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Jin S. Yang, Young-Ju Han, Dong-Soo Kim, Beom-Hwan Chang, Tai-Myung Chung, Jung C. Na A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Jin S. Yang, Young-Ju Han, Dong-Soo Kim, Beom-Hwan Chang, Tai-Myoung Chung, Jung-Chan Na A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Ronda R. Henning Vulnerability Assessment in Wireless Network. Search on Bibsonomy SAINT Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
32Haitao Tian, Liusheng Huang, Jiulong Shan, Guoliang Chen 0001 Automated Vulnerability Management through Web Services. Search on Bibsonomy GCC (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
31Demid Borodin, Ben H. H. Juurlink Protective redundancy overhead reduction using instruction vulnerability factor. Search on Bibsonomy Conf. Computing Frontiers The full citation details ... 2010 DBLP  DOI  BibTeX  RDF instruction vulnerability, selective protection, performance, redundancy, fault detection
31Amontip Jumratjaroenvanit, Yunyong Teng-Amnuay Probability of Attack Based on System Vulnerability Life Cycle. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Zero-day attack, Exploit code, Risk window, Radar chart, Vulnerability, Exploits, Life cycle, Exposure, POA
31Kameswari Kotapati, Peng Liu 0005, Thomas F. La Porta Dependency relation based vulnerability analysis of 3G networks: Can it identify unforeseen cascading attacks? Search on Bibsonomy Telecommun. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Mobile telecommunication networks, Cascading attacks, Infection propagation rules, 3G networks, Vulnerability assessment, Dependency model
31Deguang Kong, Quan Zheng 0002, Chao Chen, Jianmei Shuai, Ming Zhu ISA: a source code static vulnerability detection system based on data fusion. Search on Bibsonomy Infoscale The full citation details ... 2007 DBLP  DOI  BibTeX  RDF static analysis, data fusion, vulnerability
31Kristen R. Walcott, Greg Humphreys, Sudhanva Gurumurthi Dynamic prediction of architectural vulnerability from microarchitectural state. Search on Bibsonomy ISCA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF architecture vulnerability factor, redundant multithreading, performance, reliability, microarchitecture
31Kjell Hausken Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security investment, Information protection, Returns assumptions, Information security breach, Logistic function, Vulnerability, Linearity, Convexity, Concavity
31Stefan Kals, Engin Kirda, Christopher Krügel, Nenad Jovanovic SecuBat: a web vulnerability scanner. Search on Bibsonomy WWW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF automated vulnerability detection, security, crawling, SQL injection, XSS, cross-site scripting, scanner
31David Byers, Shanai Ardi, Nahid Shahmehri, Claudiu Duma Modeling Software VulnerabilitiesWith Vulnerability Cause Graphs. Search on Bibsonomy ICSM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF vulnerability modeling, software security
31Collin Mulliner, Giovanni Vigna Vulnerability Analysis of MMS User Agents. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Multimedia Messaging Service, Mobile devices, Mobile phones, Vulnerability Analysis, Fuzzing
31Ashish Arora, Rahul Telang Economics of Software Vulnerability Disclosure. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF disclosure policy, patching, software vulnerability, economic analysis
31Haiyu Hou, Gerry V. Dozier Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA's genetic arms race. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF AIS redesign, GENERTIA, genetic algorithm, AIS, vulnerability analysis
30Martin Eian Fragility of the Robust Security Network: 802.11 Denial of Service. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 802.11w, Security, Wireless, Denial of Service, 802.11, 802.11i
30Aiman Hanna, Hai Zhou Ling, Xiaochun Yang, Mourad Debbabi A Synergy between Static and Dynamic Analysis for the Detection of Software Security Vulnerabilities. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Static Analysis, Dynamic Analysis, Test-Data Generation, Security Testing, Security Automata
30Prasanth Anbalagan, Mladen A. Vouk On mining data across software repositories. Search on Bibsonomy MSR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Hyungwoo Kang Security Assessment Framework Using Static Analysis and Fault Injection. Search on Bibsonomy ICIC (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RPC (Remote Procedure Call), Static analysis, Fault injection, Buffer overflow, Software security, Security assessment
30Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan A Novel Quantitative Approach For Measuring Network Security. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Weidong Cui, Marcus Peinado, Helen J. Wang, Michael E. Locasto ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Madhusudhanan Chandrasekaran, Mukarram Baig, Shambhu J. Upadhyaya AEGIS: A Proactive Methodology to Shield against Zero-Day Exploits. Search on Bibsonomy AINA Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Ashish Aggarwal, Pankaj Jalote Integrating Static and Dynamic Analysis for Detecting Vulnerabilities. Search on Bibsonomy COMPSAC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Omar Hussain Alhazmi, Yashwant K. Malaiya, Indrajit Ray Security Vulnerabilities in Software Systems: A Quantitative Perspective. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Michitaka Yoshimoto, Bhed Bahadur Bista, Toyoo Takata Development of Security Scanner with High Usability. Search on Bibsonomy AINA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Shuo Chen 0001, Zbigniew Kalbarczyk, Jun Xu 0003, Ravishankar K. Iyer A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities. Search on Bibsonomy DSN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF data analysis, security vulnerabilities, finite state machine modeling
30James Riordan, Dominique Alessandri Target Naming and Service Apoptosis. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
29Jongeun Lee, Aviral Shrivastava A compiler optimization to reduce soft errors in register files. Search on Bibsonomy LCTES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF architectural vulnerability factor, link-time optimization, embedded system, compilation, static analysis, soft error, register file
29Andrew Meneely, Laurie A. Williams Secure open source collaboration: an empirical study of linus' law. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF contribution network, developer network, linus' law, metric, vulnerability
29Vadim Okun, William F. Guthrie, Romain Gaucher, Paul E. Black Effect of static analysis tools on software security: preliminary investigation. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF vulnerability, software security, static analysis tools
29Robson de Oliveira Albuquerque, Fábio Buiati, L. Javier García-Villalba, Daniel Silva Almendra, Leonardo Lobo Pulcineli, Rafael Timóteo de Sousa Júnior, Cláudia J. Barenco Abbas Proposal of a System for Searching and Indexing Heterogeneous Vulnerabilities Databases. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Vulnerability Database, Internet spiders, Security Information System, Open Source Solution
29Andrew James Simmonds, Peter Sandilands, Louis van Ekert An Ontology for Network Security Attacks. Search on Bibsonomy AACC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cyber, security, ontology, network, attack, failure, vulnerability, threat
29Hoon-Jae Lee 0001, ManKi Ahn, Seongan Lim, Sang-Jae Moon A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Protection Profiles, Vulnerability Assessment Activities, SPA/DPA, Smart Card, Side Channel Attacks, Common Criteria
29HyungJong Kim 0002 System Specification Based Network Modeling for Survivability Testing Simulation. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Survivability, Simulation Model, Vulnerability Analysis, System Specification, DEVS-Formalism
29Nikitas V. Nikitakos, Stefanos Gritzalis Risk management for new information technology insertion in a shipping company. Search on Bibsonomy Oper. Res. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Security profile, Shipping Information Technology Networks, Value-added networks, Vulnerability
29David P. Gilliam, John C. Kelly, John D. Powell, Matt Bishop Development of a Software Security Assessment Instrument to Reduce Software Security Risk. Search on Bibsonomy WETICE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Security Toolset, Vulnerability Matrix, Model Checking, Security Verification, Property-Based Testing
29David P. Gilliam, John C. Kelly, Matt Bishop Reducing Software Security Risk through an Integrated Approach. Search on Bibsonomy WETICE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Security Toolset, Vulnerability Matrix, Model Specification Checking, Security Verification, Property-Based Testing
29Louis Petingi, José Rodríguez Generalized Edge-Toughness. Search on Bibsonomy SCCC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF generalized edge-toughness, vulnerability index, edge-toughness, generalized edge-toughness index, communication network, communication links, telecommunication network reliability
29Fahad A. Alshaya, Sultan S. Alqahtani, Yasser A. Alsamel VrT: A CWE-Based Vulnerability Report Tagger : Machine Learning Driven Cybersecurity Tool for Vulnerability Classification. Search on Bibsonomy SVM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
29Sanaz Rahimi, Mehdi R. Zargham Vulnerability Scrying Method for Software Vulnerability Discovery Prediction Without a Vulnerability Database. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
27Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili, Reza Zakeri, Ali Reza Omidian Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG). Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Baoyi Wang, Jing Li, Shaomin Zhang, Xueying Guo Scanning Task Scheduling Strategy in Distributed Vulnerability Detection System. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Zhanshan (Sam) Ma Towards an Extended Evolutionary Game Theory with Survival Analysis and Agreement Algorithms for Modeling Uncertainty, Vulnerability, and Deception. Search on Bibsonomy AICI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Extended Evolutionary Game Theory, Agreement Algorithms, Frailty, Dynamic Hybrid Fault Models, UUUR (Uncertain and latent and Unobservable or Unobserved Risks), Strategic Information Warfare, Security, Reliability, Survivability, Deception, Evolutionary Game Theory, Survival Analysis
24Alka Agrawal, Shalini Chandra, Raees Ahmad Khan An Efficient Measurement of Object Oriented Design Vulnerability. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Karen Scarfone, Peter Mell An analysis of CVSS version 2 vulnerability scoring. Search on Bibsonomy ESEM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Raymond C. Parks, Edmond Rogers Vulnerability Assessment for Critical Infrastructure Control Systems. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Yanmei Zhang, Jianming Zhu A Hybrid Vulnerability Analysis Method against Non-Security Protocols. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Greg Bronevetsky, Bronis R. de Supinski Soft error vulnerability of iterative linear algebra methods. Search on Bibsonomy ICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF fault tolerance, parallel, iterative methods, linear algebra, soft errors
24Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Ettore Bompard, Marcelo Masera, Roberto Napoli, Fei Xue Assessment of Structural Vulnerability for Power Grids by Network Performance Based on Complex Networks. Search on Bibsonomy CRITIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Yolanta Beres, Jonathan Griffin, Simon Shiu, Max Heitman, David Markle, Peter Ventura Analysing the Performance of Security Solutions to Reduce Vulnerability Exposure Window. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Hai Le Vu, Kenneth K. Khaw, Tsong Yueh Chen, Fei-Ching Kuo A new approach for network vulnerability analysis. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Stefan Lindskog, Hans Hedbom, Leonardo A. Martucci, Simone Fischer-Hübner Experiences from Educating Practitioners in Vulnerability Analysis. Search on Bibsonomy World Conference on Information Security Education The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Frank Chiang, Robin Braun Self-adaptability and Vulnerability Assessment of Secure Autonomic Communication Networks. Search on Bibsonomy APNOMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Baowen Zhang, William Zhu 0001, Zhi Xue Mining Privilege Escalation Paths for Network Vulnerability Analysis. Search on Bibsonomy FSKD (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Kameswari Kotapati, Peng Liu 0005, Thomas F. La Porta CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Madhusudhanan Chandrasekaran, Mukarram Baig, Shambhu J. Upadhyaya AVARE: aggregated vulnerability assessment and response against zero-day exploits. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Rainer Böhme A Comparison of Market Approaches to Software Vulnerability Disclosure. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Turker Akyuz, Ibrahim Sogukpinar INVUS: INtelligent VUlnerability Scanner. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Ho-Jun Na, Deok-Hyun Yoon, Chang Soo Kim, Hyun-Suk Hwang Vulnerability Evaluation Tools of Matching Algorithm and Integrity Verification in Fingerprint Recognition. Search on Bibsonomy KES (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24William Wu, Frederick Yip, Eunice Yiu, Pradeep Ray Integrated Vulnerability Management System for Enterprise Networks. Search on Bibsonomy EEE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Bing Yang 0001, Mei Yang, Jianping Wang 0001, S. Q. Zheng 0001 Minimum Cost Paths Subject to Minimum Vulnerability for Reliable Communications. Search on Bibsonomy ISPAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF algorithm, reliability, complexity, Networks, graph, shortest path, survivability, network flow, protection, disjoint paths, minimum cost network flow
24Vipin Swarup, Sushil Jajodia, Joseph Pamula Rule-Based Topological Vulnerability Analysis. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Earl E. Lee II, John E. Mitchell 0001, William A. Wallace Assessing Vulnerability of Proposed Designs for Interdependent Infrastructure Systems. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Omar Ismail, Masashi Etoh, Youki Kadobayashi, Suguru Yamaguchi A Proposal and Implementation of Automatic Detection/Collection System for Cross-Site Scripting Vulnerability. Search on Bibsonomy AINA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Dan DaCosta, Christopher Dahn, Spiros Mancoridis, Vassilis Prevelakis Characterizing the 'Security Vulnerability Likelihood' of Software Functions. Search on Bibsonomy ICSM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Vladimir Penenko, Alexander Baklanov Methods of Sensitivity Theory and Inverse Modeling for Estimation of Source Parameters and Risk/Vulnerability Areas. Search on Bibsonomy International Conference on Computational Science (2) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
24John Kubiatowicz, David Chaiken, Anant Agarwal Closing the Window of Vulnerability in Multiphase Memory Transactions. Search on Bibsonomy ASPLOS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
24Andrea M. Matwyshyn, Ang Cui, Angelos D. Keromytis, Salvatore J. Stolfo Ethics in Security Vulnerability Research. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security vulnerability research ethics, security & privacy
Displaying result #101 - #200 of 6558 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license