The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Vulnerability with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1986 (16) 1987-1992 (26) 1993-1996 (27) 1997-1998 (23) 1999-2000 (30) 2001 (24) 2002 (56) 2003 (86) 2004 (146) 2005 (196) 2006 (227) 2007 (250) 2008 (259) 2009 (209) 2010 (169) 2011 (137) 2012 (165) 2013 (198) 2014 (207) 2015 (226) 2016 (251) 2017 (257) 2018 (342) 2019 (424) 2020 (484) 2021 (581) 2022 (612) 2023 (775) 2024 (155)
Publication types (Num. hits)
article(2504) book(8) data(4) incollection(62) inproceedings(3886) phdthesis(73) proceedings(21)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1664 occurrences of 928 keywords

Results
Found 6558 publication records. Showing 6558 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Peter Zipf Applying Dynamic Reconfiguration for Fault Tolerance in Fine-Grained Logic Arrays. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Sylvain Guilley, Laurent Sauvage, Philippe Hoogvorst, Renaud Pacalet, Guido Marco Bertoni, Sumanta Chaudhuri Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Lieven Desmet, Pierre Verbaeten, Wouter Joosen, Frank Piessens Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Reliability, Data sharing, Web technologies, Security and Protection, Web-based services, Software/Program Verification
15Renaud Feil, Louis Nyffenegger Evolution of cross site request forgery attacks. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Flavio Cabrera-Mora, Jizhong Xiao Preprocessing technique to signal strength data of wireless sensor network for real-time distance estimation. Search on Bibsonomy ICRA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Yi Yang 0002, Sencun Zhu, Guohong Cao Improving sensor network immunity under worm attacks: a software diversity approach. Search on Bibsonomy MobiHoc The full citation details ... 2008 DBLP  DOI  BibTeX  RDF sensor worm, graph coloring, sensor network security, percolation theory, software diversity
15Sumeet Kumar, Aneesh Aggarwal Speculative instruction validation for performance-reliability trade-off. Search on Bibsonomy HPCA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Amir Askarian, Yuxiang Zhai, Suresh Subramaniam 0001, Yvan Pointurier, Maïté Brandt-Pearce Protection and Restoration from Link Failures in DWDM Networks: A Cross-Layer Study. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Marcel Frigault, Lingyu Wang 0001 Measuring Network Security Using Bayesian Network-Based Attack Graphs. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Network, Measuring, Graph, Attack, Bayesian
15Muhammad Umair Ahmed Khan, Mohammad Zulkernine Quantifying Security in Secure Software Development Phases. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Simon P. Chung, Aloysius K. Mok Swarm Attacks against Network-Level Emulation/Analysis. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Decoder detection, network-level emulation, swarm attacks, network IDS, evasion
15Xuezhong Liu, Zengliang Liu Evaluating Method of Security Threat Based on Attacking-Path Graph Model. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, Giovanni Vigna Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Stefan Fenz, Andreas Ekelhart, Edgar R. Weippl Fortification of IT Security by Automatic Security Advisory Processing. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Aiman Hanna, Hai Zhou Ling, Jason Furlong, Zhenrong Yang, Mourad Debbabi Targeting Security Vulnerabilities: From Specification to Detection (Short Paper). Search on Bibsonomy QSIC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Dynamic Analysis, Data Dependency, Test-Data Generation, Control Flow Analysis, Security Testing, Security Automata
15Jianjun Xu, Rui Shen, Qingping Tan PRASE: An Approach for Program Reliability Analysis with Soft Errors. Search on Bibsonomy PRDC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15David Ahmad The Contemporary Software Security Landscape. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Michitaka Yoshimoto, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata Development and Evaluation of New User Interface for Security Scanner with Usability in Human Interface Study. Search on Bibsonomy NBiS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security Scanner, Human Interface Study, Usability
15Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cranor Behavioral response to phishing risk. Search on Bibsonomy eCrime Researchers Summit The full citation details ... 2007 DBLP  DOI  BibTeX  RDF survey, phishing
15Alexey Smirnov 0001, Tzi-cker Chiueh Automatic Patch Generation for Buffer Overflow Attacks. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Makoto Sugihara, Tohru Ishihara, Kazuaki J. Murakami Task scheduling for reliable cache architectures of multiprocessor systems. Search on Bibsonomy DATE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15S. G. K. Murthy, M. V. Ramana Murthy, P. Ram Kumar New Trends in Cryptography by Quantum Concepts. Search on Bibsonomy SCSS (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Alodeep Sanyal, Kunal P. Ganeshpure, Sandip Kundu Accelerating Soft Error Rate Testing Through Pattern Selection. Search on Bibsonomy IOLTS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF soft error rate (SER), simulation, automatic test pattern generation (ATPG), Soft error
15Zhichun Li, Lanjia Wang, Yan Chen 0004, Zhi Fu Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms. Search on Bibsonomy ICNP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Jun Heo, Jong Whoi Shin, Ho Sung Kim, DongHoon Shin, Gang Shin Lee, Jae-il Lee A Study for a New IT Service Information Protection Framework. Search on Bibsonomy ICSNC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Niranjan Soundararajan, Angshuman Parashar, Anand Sivasubramaniam Mechanisms for bounding vulnerabilities of processor structures. Search on Bibsonomy ISCA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF redundant threading, microarchitecture, transient faults
15Oguz Ergin, Osman S. Unsal, Xavier Vera, Antonio González 0001 Exploiting Narrow Values for Soft Error Tolerance. Search on Bibsonomy IEEE Comput. Archit. Lett. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Nuno Ferreira Neves, João Antunes, Miguel Correia 0001, Paulo Veríssimo, Rui Ferreira Neves Using Attack Injection to Discover New Vulnerabilities. Search on Bibsonomy DSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15XiaoFeng Wang 0001, Zhuowei Li 0001, Jun Xu 0003, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi Packet vaccine: black-box exploit detection and signature generation. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF black-box defense, exploit detection, vaccine injection, worm, signature generation
15Sumeet Kumar, Aneesh Aggarwal Reducing resource redundancy for concurrent error detection techniques in high performance microprocessors. Search on Bibsonomy HPCA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Preethi Natarajan, Janardhan R. Iyengar, Paul D. Amer, Randall R. Stewart SCTP: an innovative transport layer protocol for the web. Search on Bibsonomy WWW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF transport layer service, web transport, fault-tolerance, web applications, SCTP, stream control transmission protocol, head-of-line blocking
15Zhiqiang Lin, Bing Mao, Li Xie 0001 A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Ignacio J. Martinez-Moyano, Eliot H. Rich, Stephen H. Conrad, David F. Andersen Modeling the emergence of insider threat vulnerabilities. Search on Bibsonomy WSC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Ashish Aggarwal, Pankaj Jalote Monitoring the Security Health of Software Systems. Search on Bibsonomy ISSRE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Serkan Kemeç, H. Sebnem Düzgün Use of 3D Visualization in Natural Disaster Risk Assessment for Urban Areas. Search on Bibsonomy 3D-GIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Earthquake Risk Visualization, GIS/RS-CAD, Decision-Making, 3D City Model
15Wei Li 0025, Rayford B. Vaughn Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs. Search on Bibsonomy CCGRID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cluster security, exploitation graph (e-graph), network security, modeling and simulating
15Konrad J. Kulikowski, Mark G. Karpovsky, Alexander Taubin DPA on Faulty Cryptographic Hardware and Countermeasures. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Lasse Øverlier, Paul F. Syverson Valet Services: Improving Hidden Servers with a Personal Touch. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Wei Li 0025, Rayford B. Vaughn Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Soo-Jin Park, Young-Shin Park, Yong-Rak Choi, Sukhoon Kang SPAD: A Session Pattern Anomaly Detector for Pre-alerting Intrusions in Home Network. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Nabil Seddigh, Andrew Ross, Peter Pieda, Rupinder Makkar, Biswajit Nandy, Lathif Masood Improving Network Infrastructure Security using Geospatial Technology. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Nenad Jovanovic, Christopher Krügel, Engin Kirda Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Susmit Panjwani, Stephanie Tan, Keith M. Jarrin, Michel Cukier An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Jedidiah R. Crandall, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF metamorphism, polymorphism, symbolic execution, worms, honeypots, polymorphic worms
15Andy Ju An Wang Information security models and metrics. Search on Bibsonomy ACM Southeast Regional Conference (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF policy and mechanisms, modeling, verification, measurement, validation, information security
15Andy Adler Vulnerabilities in Biometric Encryption Systems. Search on Bibsonomy AVBPA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Lei Guang, Chadi Assi On the resiliency of mobile ad hoc networks to MAC layer misbehavior. Search on Bibsonomy PE-WASUN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF routing, ad hoc networks
15Matin Tamizi, Matt Weinstein, Michel Cukier Automated Checking for Windows Host Vulnerabilities. Search on Bibsonomy ISSRE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Laith A. Al-Sulaiman, Hussein M. Abdel-Wahab CACMAN: A Framework for Efficient and Highly Available CA Services in MANETs. Search on Bibsonomy ISCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai Security Weaknesses of Certain Broadcast Encryption Schemes. Search on Bibsonomy DRMTICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF time-memory-data trade-off, cryptanalysis, key management, broadcast encryption
15Hossein Asadi 0001, Mehdi Baradaran Tahoori Soft Error Modeling and Protection for Sequential Elements. Search on Bibsonomy DFT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Ram Dantu, Prakash Kolan Risk Management Using Behavior Based Bayesian Networks. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin Vulnerabilities Detection in the Configurations of MS Windows Operating System. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Adam Stubblefield, John Ioannidis, Aviel D. Rubin A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF wired equivalent privacy, Wireless security
15Ashton Applewhite, Alan Davis In the News. Search on Bibsonomy IEEE Softw. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Rui Costa Cardoso, Mário M. Freire Intelligent Assessment of Distributed Security in TCP/IP Networks. Search on Bibsonomy HSNMC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Giuseppe A. Di Lucca, Anna Rita Fasolino, M. Mastoianni, Porfirio Tramontana Identifying Cross Site Scripting Vulnerabilities in Web Applications. Search on Bibsonomy WSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Ram Dantu, Kall Loper, Prakash Kolan Risk Management using Behavior based Attack Graphs. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu J. Upadhyaya ARCHERR: Runtime Environment Driven Program Safety. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Voravud Santiraveewan, Yongyuth Permpoontanalarp A Graph-based Methodology for Analyzing IP Spoofing Attack. Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IP spoofing and Formal Method for Network Security, Network Security, Firewalls
15Ricardo Staciarini Puttini, Ludovic Mé, Rafael Timóteo de Sousa Júnior Preventive and Corrective Protection for Mobile Ad Hoc Network Routing Protocols. Search on Bibsonomy WONS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15François-Xavier Standaert, Siddika Berna Örs, Bart Preneel Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure? Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves Reasoning About Complementary Intrusion Evidence. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Chong Zhao, Xiaoliang Bai, Sujit Dey A scalable soft spot analysis methodology for compound noise effects in nano-meter circuits. Search on Bibsonomy DAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF compound noise effect, nano-meter technology, softness distribution, robustness
15Haining Wang, Kang G. Shin Transport-Aware IP Routers: A Built-In Protection Mechanism to Counter DDoS Attacks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Distributed Denial of Service (DDoS) attacks, layer-4 differentiation, resource isolation, packet classification
15Sviatoslav B. Braynov, Murtuza Jadliwala Representation and analysis of coordinated attacks. Search on Bibsonomy FMSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF attack plan, coordinated attack, model checking, attack graph, adversary modelling
15Steve Moyle, John Heasman Machine Learning to Detect Intrusion Strategies. Search on Bibsonomy KES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Sung-Do Chi, Jong Sou Park, Jang-Se Lee A Role of DEVS Simulation for Information Assurance. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Håkan Sivencrona, Per Johannessen, Mattias Persson, Jan Torin Heavy-Ion Fault Injections in the Time-Triggered Communication Protocol. Search on Bibsonomy LADC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Muxiang Zhang Adaptive Protocol for Entity Authentication and Key Agreement in Mobile Networks. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Gregory Calbert, Peter Smet, Jason B. Scholz, Hing-Wah Kwok Dynamic Games to Assess Network Value and Performance. Search on Bibsonomy Australian Conference on Artificial Intelligence The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Lawrence A. Gordon, Martin P. Loeb The economics of information security investment. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Optimal security investment
15William La Cholter, Priya Narasimhan, Daniel F. Sterne, Ravindra Balupari, Kelly Djahandari, Arvind Mani, Sandra L. Murphy IBAN: Intrusion Blocker Based on Active Networks. Search on Bibsonomy DANCE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15David M. Nicol Analysis of composite synchronization. Search on Bibsonomy PADS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Optimization, Performance Analysis, Synchronization
15Andrew Hintz Fingerprinting Websites Using Traffic Analysis. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15Haining Wang, Kang G. Shin Layer-4 Service Differentiation and Resource Isolation. Search on Bibsonomy IEEE Real Time Technology and Applications Symposium The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15Rajgopal Kannan, Sudipta Sarangi, Sibabrata Ray, S. Sitharama Iyengar Minimal Sensor Integrity in Sensor Grids. Search on Bibsonomy ICPP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15Paul A. Karger, Roger R. Schell Thirty Years Later: Lessons from the Multics Security Evaluation. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15Shih-Chieh Chang, Ching-Hwa Cheng, Wen-Ben Jone, Shin-De Lee, Jinn-Shyan Wang Charge-sharing alleviation and detection for CMOS domino circuits. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
15Jun Xu 0003, Shuo Chen 0001, Zbigniew Kalbarczyk, Ravishankar K. Iyer An Experimental Study of Security Vulnerabilities Caused by Errors. Search on Bibsonomy DSN The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
15Martin Hiller, Arshad Jhumka, Neeraj Suri An Approach for Analysing the Propagation of Data Errors in Software. Search on Bibsonomy DSN The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
15Ki-Yoong Hong, Chul Kim On a Network Security Model for the Secure Information Flow on Multilevel Secure Network. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
15Ronald W. Ritchey, Paul Ammann Using Model Checking to Analyze Network Vulnerabilities. Search on Bibsonomy S&P The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
15Samuel Patton, David Doss, William Yurcik Distributed Weakness in Virtual Private Networks. Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF distributed weakness, corporate VPN, routing attack, VPN tunnel endpoints, coordinated filtering, corporate firewall, network security, transport protocols, packet switching, network topology, network topology, telecommunication network routing, authorisation, IP network, telecommunication networks, telecommunication security, Internet service, virtual private networks, business communication
14Solange Ghernaouti-Helie, David Simms, Igli Tashi Protecting Information in a Connected World: A Question of Security and of Confidence in Security. Search on Bibsonomy NBiS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Networked society, security doctrine, complexity, dependency, information security, risk management, audit, vulnerability, compliance, confidence
14Nuno Antunes, Marco Vieira Enhancing Penetration Testing with Attack Signatures and Interface Monitoring for the Detection of Injection Vulnerabilities in Web Services. Search on Bibsonomy IEEE SCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF vulnerability detection, attack signatures, interface monitoring, security, web-services, penetration testing
14Davide Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, Richard A. Kemmerer, William K. Robertson, Fredrik Valeur, Giovanni Vigna An Experience in Testing the Security of Real-World Electronic Voting Systems. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security testing, vulnerability analysis, Voting systems
14Andrew Gronosky, Michael Atighetchi, Partha P. Pal Understanding the Vulnerabilities of a SOA Platform - A Case Study. Search on Bibsonomy NCA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF vulnerability profile, JBoss Application Server, security, Service Oriented Architecture, survivability
14Istehad Chowdhury, Mohammad Zulkernine Can complexity, coupling, and cohesion metrics be used as early indicators of vulnerabilities? Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security, complexity, empirical study, software metrics, coupling, vulnerability, software security, cohesion
14Ruqayya Abdulrahman, Sophia Alim, Daniel Neagu, Mick J. Ridley Algorithms for Data Retrieval from Online Social Network Graphs. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Automated Data Extraction, Online Social Network Graphs, Vulnerability
14Pengsu Cheng, Lingyu Wang 0001, Tao Long Compressing Attack Graphs Through Reference Encoding. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF network security, Attack graph, vulnerability analysis
14Jinjing Zhao, Gang Zhao, Yan Wen, Xiang Li 0078 Towards Detecting the Interaction Vulnerabilities in Large Distributed System. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Large distributed system, entity interaction model, FSM, vulnerability analysis
14Jin-Liang Xing, Xiaohong Li 0001, Yan Cao, Zhiyong Feng 0002, Ran Liu Information Flow Analysis of Web Service Net. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF service net, vulnerability proliferation, program slicing, web service security
14Iman Faraji, Moslem Didehban, Hamid R. Zarandi Analysis of Transient Faults on a MIPS-Based Dual-Core Processor. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Dual-core microprocessor, Microprocessor without Interlocked Pipeline Stages (MIPS), simulation-based fault injection, vulnerability analysis, fault propagation
14Philip Chan, Mo Mansuri, Hong Man Applying Systems Engineering in Tactical Wireless Network Analysis with Bayesian Networks. Search on Bibsonomy CICSyN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Wireless Network Analysis, Bayesian Networks, Systems Engineering, Vulnerability Assessment
14Katerina Goseva-Popstojanova, Brandon Miller, Risto Pantev, Ana Dimitrijevikj Empirical Analysis of Attackers Activity on Multi-tier Web Systems. Search on Bibsonomy AINA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF port and vulnerability scans, empirical analysis of malicious traffic, attacks, Web-based systems, distribution fitting
14Wook Shin, Sanghoon Kwak, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka A Small But Non-negligible Flaw in the Android Permission Scheme. Search on Bibsonomy POLICY The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Vulnerability, Android, Permission
14Kangbin Yim A New Noise Mingling Approach to Protect the Authentication Password. Search on Bibsonomy CISIS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF H/W vulnerability, password expose, keyboard
14Virginia N. L. Franqueira, Raul H. C. Lopes, Pascal van Eck Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hypergraph, attack graph, vulnerability assessment, network attack
14Supriya Madan Shielding against SQL Injection Attacks Using ADMIRE Model. Search on Bibsonomy CICSyN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security, Web Application, Vulnerability, SQL Injection, Threat modeling
Displaying result #401 - #500 of 6558 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license