The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Vulnerability with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1986 (16) 1987-1992 (26) 1993-1996 (27) 1997-1998 (23) 1999-2000 (30) 2001 (24) 2002 (56) 2003 (86) 2004 (146) 2005 (196) 2006 (227) 2007 (250) 2008 (259) 2009 (209) 2010 (169) 2011 (137) 2012 (165) 2013 (198) 2014 (207) 2015 (226) 2016 (251) 2017 (257) 2018 (342) 2019 (424) 2020 (484) 2021 (581) 2022 (612) 2023 (775) 2024 (155)
Publication types (Num. hits)
article(2504) book(8) data(4) incollection(62) inproceedings(3886) phdthesis(73) proceedings(21)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1664 occurrences of 928 keywords

Results
Found 6558 publication records. Showing 6558 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
19Joschua Schilling, Tilo Müller VANDALIR: Vulnerability Analyses Based on Datalog and LLVM-IR. Search on Bibsonomy DIMVA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Ruchi Sharma, Ritu Sibal, Sangeeta Sabharwal Software vulnerability prioritization using vulnerability description. Search on Bibsonomy Int. J. Syst. Assur. Eng. Manag. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Yongshun Xie, Chengjin Wang Vulnerability of Submarine Cable Network of Mainland China: Comparison of Vulnerability between before and after Construction of Trans-Arctic Cable System. Search on Bibsonomy Complex. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Anjie Chen, Zhibing Zhang A Comparative Study of Credentialed Vulnerability Scanning and Non-credentialed Vulnerability Scanning. Search on Bibsonomy ISPA/BDCloud/SocialCom/SustainCom The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Jiawei Qin, Hua Zhang 0001, Jing Guo, Senmiao Wang, Qiaoyan Wen, Yijie Shi Vulnerability Detection on Android Apps-Inspired by Case Study on Vulnerability Related With Web Functions. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Xiaochen Wang, Baojiang Cui, Xinda Xu, Qian Ma Research on Vulnerability Site Location and Vulnerability Similarity Technology. Search on Bibsonomy IMIS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19En He, Daoyuan Wu, Robert H. Deng Understanding Android VoIP Security: A System-Level Vulnerability Assessment. Search on Bibsonomy DIMVA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Shunta Nakagawa, Tatsuya Nagai, Hideaki Kanehara, Keisuke Furumoto, Makoto Takita, Yoshiaki Shiraishi, Takeshi Takahashi 0001, Masami Mohri, Yasuhiro Takano, Masakatu Morii Character-Level Convolutional Neural Network for Predicting Severity of Software Vulnerability from Vulnerability Description. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Kola Periyasamy, Saranya Arirangan Prediction of future vulnerability discovery in software applications using vulnerability syntax tree (PFVD-VST). Search on Bibsonomy Int. Arab J. Inf. Technol. The full citation details ... 2019 DBLP  BibTeX  RDF
19Yazdan Movahedi, Michel Cukier, Ilir Gashi Vulnerability prediction capability: A comparison between vulnerability discovery models and neural network models. Search on Bibsonomy Comput. Secur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Jeya Mala Dharmalingam, M. Eswaran An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks: Intelligent SQLIA Vulnerability Analyzer Agent. Search on Bibsonomy Int. J. Intell. Inf. Technol. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Sonja Glumich, Juanita Riley, E. Paul Ratazzi, Amanda Ozanam BP: Integrating Cyber Vulnerability Assessments Earlier into the Systems Development Lifecycle: A Methodology to Conduct Early-Cycle Cyber Vulnerability Assessments. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Dongdong Du, Xingzhang Ren, Yupeng Wu, Jien Chen, Wei Ye 0004, Jinan Sun, Xiangyu Xi, Qing Gao, Shikun Zhang Refining Traceability Links Between Vulnerability and Software Component in a Vulnerability Knowledge Graph. Search on Bibsonomy ICWE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Andrew Feutrill, Dinesha Ranathunga, Yuval Yarom, Matthew Roughan The Effect of Common Vulnerability Scoring System Metrics on Vulnerability Exploit Delay. Search on Bibsonomy CANDAR The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Zhuobing Han, Xiaohong Li 0001, Zhenchang Xing, Hongtao Liu, Zhiyong Feng 0002 Learning to Predict Severity of Software Vulnerability Using Only Vulnerability Description. Search on Bibsonomy ICSME The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Ali Azarpeyvand, Mostafa E. Salehi, Seid Mehdi Fakhraie, Saeed Safari Fast and accurate architectural vulnerability analysis for embedded processors using Instruction Vulnerability Factor. Search on Bibsonomy Microprocess. Microsystems The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Pontus Johnson, Dan Gorton, Robert Lagerström, Mathias Ekstedt Time between vulnerability disclosures: A measure of software product vulnerability. Search on Bibsonomy Comput. Secur. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Frank Li 0001, Zakir Durumeric, Jakub Czyz, Mohammad Karami, Michael D. Bailey, Damon McCoy, Stefan Savage, Vern Paxson You've Got Vulnerability: Exploring Effective Vulnerability Notifications. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2016 DBLP  BibTeX  RDF
19Bhargava Shastry, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert Towards Vulnerability Discovery Using Staged Program Analysis. Search on Bibsonomy DIMVA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Tao Wen, Yuqing Zhang, Qianru Wu, Gang Yang ASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data. Search on Bibsonomy J. Commun. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Luca Allodi Risk-Based Vulnerability Management. Exploiting the economic nature of the attacker to build sound and measurable vulnerability mitigation strategies. Search on Bibsonomy 2015   RDF
19Jian Luo 0003, Kueiming Lo, Haoran Qu A Software Vulnerability Rating Approach Based on the Vulnerability Database. Search on Bibsonomy J. Appl. Math. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Romain Lardy Calcul intensif pour l'évaluation de la vulnérabilité en utilisant une approche d'Ingénierie Dirigée par les Modèles: application à la vulnérabilité des prairies au changement climatique sous contraintes de plans d'expériences. (Intensive calculation for vulnerability assessment using a Model Driven Engineering approach: application to prairie vulnerability to climate change under experimental design constraints). Search on Bibsonomy 2013   RDF
19Andreas Paul 0003, Franka Schuster, Hartmut König Towards the Protection of Industrial Control Systems - Conclusions of a Vulnerability Analysis of Profinet IO. Search on Bibsonomy DIMVA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Mohamed Almorsy, John Grundy 0001, Amani S. Ibrahim Supporting automated vulnerability analysis using formalized vulnerability signatures. Search on Bibsonomy ASE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Thomas Schreck, Stefan Berger, Jan Göbel BISSAM: Automatic Vulnerability Identification of Office Documents. Search on Bibsonomy DIMVA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Su Zhang, Xinming Ou, John Homer Effective Network Vulnerability Assessment through Model Abstraction. Search on Bibsonomy DIMVA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Adam Doupé, Marco Cova, Giovanni Vigna Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners. Search on Bibsonomy DIMVA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
19Hans de Bruijn, Mark de Bruijne, Bauke Steenhuisen Managing infrastructure vulnerability: An empirical study on the use of performance management systems that seek to reduce vulnerability of network industries. Search on Bibsonomy ISTAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Jeremy W. Sheaffer, David P. Luebke, Kevin Skadron The Visual Vulnerability Spectrum: Characterizing Architectural Vulnerability for Graphics Hardware. Search on Bibsonomy Graphics Hardware The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Andy Ozment The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
19Sufatrio, Roland H. C. Yap, Liming Zhong A Machine-Oriented Vulnerability Database for Automated Vulnerability Detection and Processing. Search on Bibsonomy LISA The full citation details ... 2004 DBLP  BibTeX  RDF
19H. S. Venter, Jan H. P. Eloff Evaluating vulnerability scanners using harmonised vulnerability categories. Search on Bibsonomy South Afr. Comput. J. The full citation details ... 2003 DBLP  BibTeX  RDF
17Wei Zhang 0002 Computing and Minimizing Cache Vulnerability to Transient Errors. Search on Bibsonomy IEEE Des. Test Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Lide Duan, Bin Li 0008, Lu Peng 0001 Versatile prediction and fast estimation of Architectural Vulnerability Factor from processor performance metrics. Search on Bibsonomy HPCA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Tugkan Tuglular, Can Arda Muftuoglu, Özgür Kaya, Fevzi Belli, Michael Linschulte GUI-Based Testing of Boundary Overflow Vulnerability. Search on Bibsonomy COMPSAC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Guiomar Corral, Alvaro Garcia-Piquer, Albert Orriols-Puig, Albert Fornells, Elisabet Golobardes Multiobjective Evolutionary Clustering Approach to Security Vulnerability Assesments. Search on Bibsonomy HAIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF AI applications, Clustering, Evolutionary Algorithm, Network Security, Unsupervised Learning, Multiobjective Optimization
17Jin Han, Debin Gao, Robert H. Deng On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17David McKinney New Hurdles for Vulnerability Disclosure. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Serguei A. Mokhov, Marc-André Laverdière, Djamel Benredjem Taxonomy of Linux Kernel Vulnerability Solutions. Search on Bibsonomy Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Wangyuan Zhang, Tao Li 0006 Microarchitecture soft error vulnerability characterization and mitigation under 3D integration technology. Search on Bibsonomy MICRO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Edgar C. Portante, Thomas N. Taxon, James A. Kavicky, Tarek Abdallah, Timothy K. Perkins Linear modeling and simulation of low-voltage electric system for single-point vulnerability assessment of military installation. Search on Bibsonomy WSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Jaegu Song, Seoksoo Kim A Study on Composite System Vulnerability through CC Analysis. Search on Bibsonomy MUE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF evaluate, Composite, Common criteria
17José Fonseca 0002, Marco Vieira, Henrique Madeira Training Security Assurance Teams Using Vulnerability Injection. Search on Bibsonomy PRDC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Songhe Zhao, Charles A. Shoniregun, Chris Imafidon Addressing the vulnerability of the 4-way handshake of 802.11i. Search on Bibsonomy ICDIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Rattikorn Hewett, Phongphun Kijsanayothin Host-Centric Model Checking for Network Vulnerability Analysis. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Simon Liu, Larry Holt, Bruce Cheng A Practical Vulnerability Assessment Program. Search on Bibsonomy IT Prof. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Percy Antonio Pari Salas, Padmanabhan Krishnan, Kelvin J. Ross Model-Based Security Vulnerability Testing. Search on Bibsonomy ASWEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Bivas Mitra, Fernando Peruani, Sujoy Ghose, Niloy Ganguly Analyzing the vulnerability of superpeer networks against attack. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF complex network theory, superpeer networks, attacks
17Martin Boldt, Bengt Carlsson, Roy Martinsson Software Vulnerability Assessment Version Extraction and Verification. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Judith E. Y. Rossebø, Scott Cadzow, Paul Sijben eTVRA, a Threat, Vulnerability and Risk Assessment Method and Tool for eEurope. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Muhammad Sher, Thomas Magedanz 3G-WLAN Convergence: Vulnerability, Attacks Possibilities and Security Model. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Eeva Aarnio, Reetta Raitoharju Information Specificity Vulnerability: Comparison of Medication Information Flows in Different Health Care Units. Search on Bibsonomy I3E (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Eun-Jun Yoon, Kee-Young Yoo Vulnerability of User Identification and Key Agreement Protocol with User Anonymity. Search on Bibsonomy FGCN (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Jens Rüdinger, Adolf Finger Algorithm Design and Side Channel Vulnerability on the Example of DPA Attack. Search on Bibsonomy ICN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Daniel W. Repperger New Results in Understanding Performance and Vulnerability in Complex Networks. Search on Bibsonomy CIRA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cliff Changchun Zou Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Qun Zhou A Service-Oriented Solution Framework for Distributed Virus Detection and Vulnerability Remediation (VDVR) System. Search on Bibsonomy IEEE SCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Fred A. Bower, Derek Hower, Mahmut Yilmaz, Daniel J. Sorin, Sule Ozev Applying architectural vulnerability Analysis to hard faults in the microprocessor. Search on Bibsonomy SIGMETRICS/Performance The full citation details ... 2006 DBLP  DOI  BibTeX  RDF hard-fault tolerance, reliability, computer architecture
17Omar Hussain Alhazmi, Yashwant K. Malaiya Measuring and Enhancing Prediction Capabilities of Vulnerability Discovery Models for Apache and IIS HTTP Servers. Search on Bibsonomy ISSRE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Judith E. Y. Rossebø, Scott Cadzow, Paul Sijben eTVRA, a Threat, Vulnerability and Risk Assessment Tool for eEurope. Search on Bibsonomy iTrust The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Reza Zakeri, Rasool Jalili, Hamid Reza Shahriari, Hassan Abolhassani Using Description Logics for Network Vulnerability Analysis. Search on Bibsonomy ICN/ICONS/MCL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Do Hyeon Lee, Jeom Goo Kim Conversion Scheme for Reducing Security Vulnerability in IPv4/ IPv6 Networks. Search on Bibsonomy KES (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Roland Rieke Modelling and Analysing Network Security Policies in a Given Vulnerability Setting. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF attack simulation, network security policies, security modelling and simulation, risk assessment, threats analysis, critical infrastructure protection
17Jung-Taek Seo, Yun-ju Kim, Eung Ki Park, Sang-Won Lee, Taeshik Shon, Jongsub Moon Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms. Search on Bibsonomy FSKD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Jung-Ho Eom, Young-Ju Han, Tai-Myoung Chung Modeling Active Cyber Attack for Network Vulnerability Assessment. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Yong Ho Song, Jung Min Park, Yongsu Park, Eul-Gyu Im A New Methodology of Analyzing Security Vulnerability for Network Services. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Shiping Chen 0003, Dongyu Liu, Songqing Chen, Sushil Jajodia V-COPS: A Vulnerability-Based Cooperative Alert Distribution System. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Sung-Ming Yen, Wei-Chih Lien, Sang-Jae Moon, JaeCheol Ha Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cryptography, Smart card, Side-channel attack, Simple power analysis (SPA), Chosen-message attack
17Kim J. Allen, Craig Black Implementation of a framework for vulnerability/lethality modeling and simulation. Search on Bibsonomy WSC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Madhukar Anand, Zachary G. Ives, Insup Lee 0001 Quantifying eavesdropping vulnerability in sensor networks. Search on Bibsonomy DMSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF wireless sensor networks, data streams, probability distribution, eavesdropping
17Tao Zhang, Mingzeng Hu, Xiao-chun Yun, Yongzheng Zhang 0002 Computer Vulnerability Evaluation Using Fault Tree Analysis. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Wei Zhang 0002 Computing Cache Vulnerability to Transient Errors and Its Implication. Search on Bibsonomy DFT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Xinli Huang, Fanyuan Ma, Yin Li Attack Vulnerability of Peer-to-Peer Networks and Cost-Effective Immunization. Search on Bibsonomy ISPA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Ratsameetip Wita, Yunyong Teng-Amnuay Vulnerability Profile for Linux. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Yongzheng Zhang 0002, Binxing Fang, Yue Chi, Xiao-chun Yun Assessment of Windows System Security Using Vulnerability Relationship Graph. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Amir Roth Store Vulnerability Window (SVW): Re-Execution Filtering for Enhanced Load Optimization. Search on Bibsonomy ISCA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Arijit Biswas, Paul Racunas, Razvan Cheveresan, Joel S. Emer, Shubhendu S. Mukherjee, Ram Rangan Computing Architectural Vulnerability Factors for Address-Based Structures. Search on Bibsonomy ISCA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Stefano Bistarelli, Simon N. Foley, Barry O'Sullivan Modeling and detecting the cascade vulnerability problem using soft constraints. Search on Bibsonomy SAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, constraints, multilevel security, soft constraints
17Rae Zimmerman Decision-making and the vulnerability of interdependent critical infrastructure. Search on Bibsonomy SMC (5) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Gerry V. Dozier, Douglas Brown, John Hurley, Krystal Cain Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers. Search on Bibsonomy GECCO (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17D. Frank Hsu Graph Containers, Information Delay, and Network Vulnerability. Search on Bibsonomy AINA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Anil Sharma, Jason R. Martin, Nitin Anand, Michel Cukier, William H. Sanders Ferret: A Host Vulnerability Checking Tool. Search on Bibsonomy PRDC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Security auditing tool, host vulnerabilities, security evaluation
17Shubhendu S. Mukherjee, Christopher T. Weaver, Joel S. Emer, Steven K. Reinhardt, Todd M. Austin Measuring Architectural Vulnerability Factors. Search on Bibsonomy IEEE Micro The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Shubhendu S. Mukherjee, Christopher T. Weaver, Joel S. Emer, Steven K. Reinhardt, Todd M. Austin A Systematic Methodology to Compute the Architectural Vulnerability Factors for a High-Performance Microprocessor. Search on Bibsonomy MICRO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Mauro Migliardi, Stefano Zappaterra, Massimo Maresca, Chiara Bisso HARNESSing Intranet Computational Power for Legacy Applications: The Case of Ship Vulnerability Evaluation. Search on Bibsonomy IPDPS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Mohamed G. Gouda, Chin-Tser Huang, Anish Arora On the Security and Vulnerability of PING. Search on Bibsonomy WSS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17J. Michael Nye Network security and vulnerability. Search on Bibsonomy AFIPS National Computer Conference The full citation details ... 1983 DBLP  DOI  BibTeX  RDF
15Chengyu Song, Jianwei Zhuge, Xinhui Han, Zhiyuan Ye Preventing drive-by download via inter-module communication monitoring. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF inter-module communication, malicious script, intrusion detection, ActiveX, drive-by download
15Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker Beyond heuristics: learning to classify vulnerabilities and predict exploits. Search on Bibsonomy KDD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF SVM, supervised learning, vulnerabilities, exploits
15Nam H. Pham, Tung Thanh Nguyen, Hoan Anh Nguyen, Xinying Wang, Anh Tuan Nguyen 0001, Tien N. Nguyen Detecting recurring and similar software vulnerabilities. Search on Bibsonomy ICSE (2) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens, Sven Lachmund, Thomas Walter 0001 Breaking the memory secrecy assumption. Search on Bibsonomy EUROSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF buffer overread, probabilistic countermeasure, buffer overflow, systems security, bypass
15Nils Gruschka, Luigi Lo Iacono Vulnerable Cloud: SOAP Message Security Validation Revisited. Search on Bibsonomy ICWS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Lutz Lowis, Rafael Accorsi On a Classification Approach for SOA Vulnerabilities. Search on Bibsonomy COMPSAC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Michal Choras, Rafal Kozik, Adam Flizikowski, Rafal Renk, Witold Holubowicz Ontology-Based Decision Support for Security Management in Heterogeneous Networks. Search on Bibsonomy ICIC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Anita Lungu, Pradip Bose, Alper Buyuktosunoglu, Daniel J. Sorin Dynamic power gating with quality guarantees. Search on Bibsonomy ISLPED The full citation details ... 2009 DBLP  DOI  BibTeX  RDF execution units, low power, power management, microarchitecture, power gating
15Nico H. L. Kuijpers, Huub M. M. ten Eikelder, Sander Verheule Atrial Anatomy Influences Onset and Termination of Atrial Fibrillation: A Computer Model Study. Search on Bibsonomy FIMH The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Atrial anatomy, mechanoelectric feedback, stretch-activated channels, atrial fibrillation
15Flavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur Wirelessly Pickpocketing a Mifare Classic Card. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Shu Chen, Yingying Chen 0001, Wade Trappe Exploiting environmental properties for wireless localization. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee Alert propagation in mobile ad hoc networks. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 6558 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license