The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Vulnerability Analysis (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-2002 (20) 2003-2004 (20) 2005 (15) 2006 (15) 2007 (25) 2008 (16) 2009-2010 (42) 2011-2012 (24) 2013 (25) 2014 (18) 2015 (32) 2016 (30) 2017 (32) 2018 (59) 2019 (33)
Publication types (Num. hits)
article(122) book(2) incollection(20) inproceedings(258) phdthesis(4)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 144 occurrences of 92 keywords

Results
Found 406 publication records. Showing 406 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
95Hyung-Jong Kim Vulnerability Modeling and Simulation for DNS Intrusion Tolerance System Construction. Search on Bibsonomy AIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Atomic Vulnerability, DNS, Intrusion Tolerance, Vulnerability Analysis, DEVS formalism
85HyungJong Kim, KyungHee Koh, DongHoon Shin, HongGeun Kim Vulnerability Assessment Simulation for Information Infrastructure Protection. Search on Bibsonomy InfraSec The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Knowledge-Based Simulation, Modeling and Simulation, Vulnerability Analysis, Information Infrastructure, Vulnerability Assessment
72Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Giovanni Vigna Multi-module vulnerability analysis of web-based applications. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multi-step attacks, static analysis, web applications, dynamic analysis, vulnerability analysis
68Youngsup Kim, Seung Yub Baek, Geuk Lee Intelligent Tool for Enterprise Vulnerability Assessment on a Distributed Network Environment Using Nessus and OVAL. Search on Bibsonomy KES (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
63Wangyuan Zhang, Xin Fu, Tao Li 0006, José A. B. Fortes An Analysis of Microarchitecture Vulnerability to Soft Errors on Simultaneous Multithreaded Architectures. Search on Bibsonomy ISPASS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF thread-aware reliability optimization, microarchitecture vulnerability, simultaneous multithreaded architecture, semiconductor transient fault, microprocessor reliability, processor throughput, soft error vulnerability analysis, SPEC CPU 2000 benchmark, microarchitecture structure, microarchitecture reliability profile, fetch policy, thread-level parallelism, multithreading architecture
63Mohammad Ebrahim Rafiei, Mohsen Taherian, Hamid Mousavi, Ali Movaghar, Rasool Jalili Vulnerability Analysis in VGBPS Using Prolog. Search on Bibsonomy FSEN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Protection System, Safety Problem, Prolog, Vulnerability Analysis
48Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu 0003 Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF memory corruption, debugging, vulnerability analysis
46Diptikalyan Saha Extending logical attack graphs for efficient vulnerability analysis. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF logic programming, attack graphs, incremental analysis
46Yong-Jun You, Sung-Do Chi SIMVA: simulation-based network vulnerability analysis system. Search on Bibsonomy SpringSim The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SES/MB, vulnerability analysis system, simulation, network security, DEVS
46Swathi Nambiar Kadala Manikoth, Fabio Di Troia, Mark Stamp Masquerade Detection on Mobile Devices. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
46Suvodeep Mazumdar, Jing Wang Big Data and Cyber Security: A Visual Analytics Perspective. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
46Steven Walker-Roberts, Mohammad Hammoudeh Artificial Intelligence Agents as Mediators of Trustless Security Systems and Distributed Computing Applications. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
46Deebiga Rajeswaran, Fabio Di Troia, Thomas H. Austin, Mark Stamp Function Call Graphs Versus Machine Learning for Malware Detection. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
46Kyle Coffey, Leandros A. Maglaras, Richard Smith 0002, Helge Janicke, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee 0001, Stylianos Rallis, Awais Yousaf Vulnerability Assessment of Cyber Security for SCADA Systems. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
46Mark Stamp A Survey of Machine Learning Algorithms and Their Application in Information Security. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
46Alexandros Chrysikos, Stephen McGuire A Predictive Model for Risk and Trust Assessment in Cloud Computing: Taxonomy and Analysis for Attack Pattern Detection. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
46Bo Zhou, Curtis L. Maines, Stephen Tang 0001, Qi Shi A Framework for the Visualisation of Cyber Security Requirements and Its Application in BPMN. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
46Igor V. Kotenko, Elena Doynikova, Andrey Chechulin, Andrey Fedorchenko AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
46Saad Khan, Simon Parkinson Automated Planning of Administrative Tasks Using Historic Events: A File System Case Study. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
46Vivin Paliath, Paulo Shakarian Defending Against Chained Cyber-Attacks by Adversarial Agents. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
46Dhiviya Dhanasekar, Fabio Di Troia, Katerina Potika, Mark Stamp Detecting Encrypted and Polymorphic Malware Using Hidden Markov Models. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
46Liam Grant, Simon Parkinson Identifying File Interaction Patterns in Ransomware Behaviour. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
46Yi Shi 0001, Yalin E. Sagduyu, Kemal Davaslioglu, Renato Levy Vulnerability Detection and Analysis in Adversarial Deep Learning. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
46Muhammad Ajmal Azad, Junaid Arshad, Farhan Riaz SOCIO-LENS: Spotting Unsolicited Caller Through Network Analysis. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
46Saad Khan, Simon Parkinson Review into State of the Art of Vulnerability Assessment using Artificial Intelligence. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
44Young-Ju Han, Jin S. Yang, Beom-Hwan Chang, Tai-Myung Chung SVAM: The Scalable Vulnerability Analysis Model Based on Active Networks. Search on Bibsonomy ICOIN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
40Xuejiao Liu, Debao Xiao, Nian Ma, Jie Yu A Scalable, Vulnerability Modeling and Correlating Method for Network Security. Search on Bibsonomy Infoscale The full citation details ... 2009 DBLP  DOI  BibTeX  RDF vulnerability correlation, modeling, scalable, Network security
39Collin Mulliner, Giovanni Vigna Vulnerability Analysis of MMS User Agents. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Multimedia Messaging Service, Mobile devices, Mobile phones, Vulnerability Analysis, Fuzzing
39Haiyu Hou, Gerry V. Dozier Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA's genetic arms race. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF AIS redesign, GENERTIA, genetic algorithm, AIS, vulnerability analysis
37Ha-Thanh Le, Peter Kok Keong Loh Evaluating AVDL descriptions for web application vulnerability analysis. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Pradip De, Yonghe Liu, Sajal K. Das 0001 An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols in Wireless Sensor Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili, Reza Zakeri, Ali Reza Omidian Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG). Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33HyungJong Kim System Specification Based Network Modeling for Survivability Testing Simulation. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Survivability, Simulation Model, Vulnerability Analysis, System Specification, DEVS-Formalism
31Gang Zhao, Xiaohui Kuang, Weimin Zheng An Emulation Environment for Vulnerability Analysis of Large-Scale Distributed System. Search on Bibsonomy GCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Emulation Environment, Image Reload, Vulnerability Analysis, Topology Generation, Large-scale Distributed System
31Clifford C. Juan, James Bret Michael, Christopher S. Eagle Vulnerability Analysis of HD Photo Image Viewer Applications. Search on Bibsonomy SSIRI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF HD Photo, image viewer, security, testing, parser, vulnerability analysis, Fuzzing
31Young-Hwan Bang, Yoon-Jung Jung, In-Jung Kim, Namhoon Lee, Gang-Soo Lee The Design and Development for Risk Analysis Automatic Tool. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Safeguard, Vulnerability, Risk Analysis, Interview, Threat, Asset, Inquiry
30Shuai Wang 0006, Jie S. Hu, Sotirios G. Ziavras On the Characterization of Data Cache Vulnerability in High-Performance Embedded Microprocessors. Search on Bibsonomy ICSAMOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Stefan Lindskog, Hans Hedbom, Leonardo A. Martucci, Simone Fischer-Hübner Experiences from Educating Practitioners in Vulnerability Analysis. Search on Bibsonomy World Conference on Information Security Education The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Baowen Zhang, William Zhu, Zhi Xue Mining Privilege Escalation Paths for Network Vulnerability Analysis. Search on Bibsonomy FSKD (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Vipin Swarup, Sushil Jajodia, Joseph Pamula Rule-Based Topological Vulnerability Analysis. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Gavin Manes, Dominic Schulte, Seth Guenther, Sujeet Shenoi NetGlean: A Methodology for Distributed Network Security Scanning. Search on Bibsonomy J. Network Syst. Manage. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Operating system detection, network scanning, host discovery, vulnerability analysis
26Lingyu Wang 0001, Anoop Singhal, Sushil Jajodia Toward measuring network security using attack graphs. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF intrusion detection, security metrics, attack graphs, vulnerability analysis
26Marco Cova, Viktoria Felmetsger, Greg Banks, Giovanni Vigna Static Detection of Vulnerabilities in x86 Executables. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF binary static analysis, symbolic execution, Vulnerability analysis, taint analysis
26Hågen Hasle, Yngve Kristiansen, Ketil Kintel, Einar Snekkenes Measuring Resistance to Social Engineering. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Information security, Security metrics, Security testing, Vulnerability analysis, Social engineering
24Jeya Mala Dharmalingam, M. Eswaran An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks: Intelligent SQLIA Vulnerability Analyzer Agent. Search on Bibsonomy IJIIT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Ali Azarpeyvand, Mostafa E. Salehi, Seid Mehdi Fakhraie, Saeed Safari Fast and accurate architectural vulnerability analysis for embedded processors using Instruction Vulnerability Factor. Search on Bibsonomy Microprocessors and Microsystems - Embedded Hardware Design The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Mohamed Almorsy, John Grundy 0001, Amani S. Ibrahim Supporting automated vulnerability analysis using formalized vulnerability signatures. Search on Bibsonomy ASE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Gang Zhao, Hua Chen, Dongxia Wang Data-Flow Based Analysis of Java Bytecode Vulnerability. Search on Bibsonomy WAIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Ronda R. Henning Vulnerability Assessment in Wireless Network. Search on Bibsonomy SAINT Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Gerry V. Dozier, Douglas Brown, John Hurley, Krystal Cain Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers. Search on Bibsonomy GECCO (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cliff Changchun Zou Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Andy Ju An Wang Information security models and metrics. Search on Bibsonomy ACM Southeast Regional Conference (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF policy and mechanisms, modeling, verification, measurement, validation, information security
18Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, Giovanni Vigna Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Davide Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, Richard A. Kemmerer, William K. Robertson, Fredrik Valeur, Giovanni Vigna An Experience in Testing the Security of Real-World Electronic Voting Systems. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security testing, vulnerability analysis, Voting systems
18Pengsu Cheng, Lingyu Wang 0001, Tao Long Compressing Attack Graphs Through Reference Encoding. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF network security, Attack graph, vulnerability analysis
18Jinjing Zhao, Gang Zhao, Yan Wen, Xiang Li Towards Detecting the Interaction Vulnerabilities in Large Distributed System. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Large distributed system, entity interaction model, FSM, vulnerability analysis
18Iman Faraji, Moslem Didehban, Hamid R. Zarandi Analysis of Transient Faults on a MIPS-Based Dual-Core Processor. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Dual-core microprocessor, Microprocessor without Interlocked Pipeline Stages (MIPS), simulation-based fault injection, vulnerability analysis, fault propagation
18Francesco Buccafurri, Gianluca Caminiti, Gianluca Lax Fortifying the dalì attack on digital signature. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF E-signature, digital signature, vulnerability analysis
18Steven Noel, Sushil Jajodia Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs. Search on Bibsonomy J. Network Syst. Manage. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Topological vulnerability analysis, Intrusion detection, Attack graphs, Sensor placement
18Dawn Xiaodong Song, David Brumley, Heng Yin, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, Prateek Saxena BitBlaze: A New Approach to Computer Security via Binary Analysis. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF malware analysis and defense, vulnerability analysis and defense, reverse engineering, Binary analysis
18Anu Singh, C. R. Ramakrishnan, I. V. Ramakrishnan, Scott D. Stoller, David Scott Warren Security policy analysis using deductive spreadsheets. Search on Bibsonomy FMSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SELinux policy, security policy analysis, vulnerability analysis
18Steven Noel, Michael Jacobs 0001, Pramod Kalapa, Sushil Jajodia Multiple Coordinated Views for Network Attack Graphs. Search on Bibsonomy VizSEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Network attack modeling, network attack graphs, topological vulnerability analysis, graph filtering, graph visualization, graph clustering
18Steven Noel, Sushil Jajodia Managing attack graph complexity through visual hierarchical aggregation. Search on Bibsonomy VizSEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF network attack graphs, network attack modeling, vulnerability analysis, clustered graphs
18Brian Chess Improving Computer Security Using Extended Static Checking. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2002 DBLP  DOI  BibTeX  RDF formal methods, vulnerability analysis, static checking
16Jun Heo, Jong Whoi Shin, Ho Sung Kim, DongHoon Shin, Gang Shin Lee, Jae-il Lee A Study for a New IT Service Information Protection Framework. Search on Bibsonomy ICSNC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Sviatoslav B. Braynov, Murtuza Jadliwala Representation and analysis of coordinated attacks. Search on Bibsonomy FMSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF attack plan, coordinated attack, model checking, attack graph, adversary modelling
15Frank Chiang, Robin Braun Self-adaptability and Vulnerability Assessment of Secure Autonomic Communication Networks. Search on Bibsonomy APNOMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Lasse Øverlier, Paul F. Syverson Valet Services: Improving Hidden Servers with a Personal Touch. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Nabil Seddigh, Andrew Ross, Peter Pieda, Rupinder Makkar, Biswajit Nandy, Lathif Masood Improving Network Infrastructure Security using Geospatial Technology. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Ram Dantu, Prakash Kolan Risk Management Using Behavior Based Bayesian Networks. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Ram Dantu, Kall Loper, Prakash Kolan Risk Management using Behavior based Attack Graphs. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Voravud Santiraveewan, Yongyuth Permpoontanalarp A Graph-based Methodology for Analyzing IP Spoofing Attack. Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IP spoofing and Formal Method for Network Security, Network Security, Firewalls
15Ricardo Staciarini Puttini, Ludovic Mé, Rafael Timóteo de Sousa Júnior Preventive and Corrective Protection for Mobile Ad Hoc Network Routing Protocols. Search on Bibsonomy WONS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Sung-Do Chi, Jong Sou Park, Jang-Se Lee A Role of DEVS Simulation for Information Assurance. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Hui Deng, Hui Liu, Ying Guo, Baofeng Zhang Memory Allocation Vulnerability Analysis and Analysis Optimization for C Programs Based on Formal Methods. Search on Bibsonomy JSW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Ashish Sureka, Atul Goyal, Ayushi Rastogi Using social network analysis for mining collaboration data in a defect tracking system for risk and vulnerability analysis. Search on Bibsonomy ISEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
13Aein Khabazian, Jiming Peng Vulnerability Analysis of the Financial Network. Search on Bibsonomy Management Science The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
13Sangjun Kim, Yuchang Won, In-Hee Park, Yongsoon Eun, Kyung-Joon Park Cyber-Physical Vulnerability Analysis of Communication-Based Train Control. Search on Bibsonomy IEEE Internet of Things Journal The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
13Maede Zolanvari, Marcio Andrey Teixeira, Lav Gupta, Khaled M. Khan, Raj Jain Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things. Search on Bibsonomy IEEE Internet of Things Journal The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
13Liu Hong, Xin Zhong, Min Ouyang, Hui Tian, Xiaozheng He Vulnerability analysis of public transit systems from the perspective of urban residential communities. Search on Bibsonomy Rel. Eng. & Sys. Safety The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
13Marian Sorin Nistor, Stefan Pickl, Manon Raap, Martin Zsifkovits Network efficiency and vulnerability analysis using the flow-weighted efficiency measure. Search on Bibsonomy ITOR The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
13Paresh Risbud, Nikolaos Gatsis, Ahmad F. Taha Vulnerability Analysis of Smart Grids to GPS Spoofing. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
13Ming Jin 0002, Javad Lavaei, Karl Henrik Johansson Power Grid AC-Based State Estimation: Vulnerability Analysis Against Cyber Attacks. Search on Bibsonomy IEEE Trans. Automat. Contr. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
13Jaepyo Park, Yeunsoo Choo, Jonghee Lee A Hybrid Vulnerability Analysis Tool Using a Risk Evaluation Technique. Search on Bibsonomy Wireless Personal Communications The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
13Marco Angelini, Graziano Blasilli, Tiziana Catarci, Simone Lenti, Giuseppe Santucci Vulnus: Visual Vulnerability Analysis for Network Security. Search on Bibsonomy IEEE Trans. Vis. Comput. Graph. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
13Ignacio Losada Carreno, Anna Scaglione, Anatoly Zlotnik, Deepjyoti Deka, Kaarthik Sundar An Adversarial Model for Attack Vector Vulnerability Analysis on Power and Gas Delivery Operations. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
13Khalid Mahmood Malik, Hafiz Malik, Roland Baumann Towards Vulnerability Analysis of Voice-Driven Interfaces and Countermeasures for Replay. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
13Daegeon Kim, Huy Kang Kim Security Requirements of Commercial Drones for Public Authorities by Vulnerability Analysis of Applications. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
13Arash Beheshtian, Kieran Donaghy, Xue Zhang, Rick Geddes Vulnerability analysis of Manhattan's motor fuel supply chain network. Search on Bibsonomy IJCIS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
13William Diehl, Abubakr Abdulgadir, Jens-Peter Kaps Vulnerability Analysis of a Soft Core Processor through Fine-grain Power Profiling. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2019 DBLP  BibTeX  RDF
13Wang Quan-wei, Xu Ge-ning, Wen Hao Research on health monitoring and sensing technology based on vulnerability analysis. Search on Bibsonomy Cluster Computing The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
13Atefeh Nirumand, Bahman Zamani, Behrouz Tork Ladani VAnDroid: A framework for vulnerability analysis of Android applications using a model-driven reverse engineering technique. Search on Bibsonomy Softw., Pract. Exper. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
13Edwin Franco Myloth Josephlal, Sridhar Adepu Vulnerability Analysis of an Automotive Infotainment System's WIFI Capability. Search on Bibsonomy HASE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
13Muluken Hailesellasie, Jacob Nelson, Faiq Khalid, Syed Rafay Hasan VAWS: Vulnerability Analysis of Neural Networks using Weight Sensitivity. Search on Bibsonomy MWSCAS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
13G. Mori Gonzalez, I. Petrunin, R. Zbikowski, K. Voutsis, R. Verdeguer Moreno Vulnerability Analysis of GPS Receiver Software. Search on Bibsonomy ICL-GNSS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
13Jorik Oostenbrink, Fernando A. Kuipers The Risk of Successive Disasters: A Blow-by-Blow Network Vulnerability Analysis. Search on Bibsonomy Networking The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
13Marko Esche, Felix Salwiczek, Federico Grasso Toro Formalization of Software Risk Assessment Results in Legal Metrology Based on ISO/IEC 18045 Vulnerability Analysis. Search on Bibsonomy FedCSIS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
13Geng Zhang, Jian Hou, Yang Wang, Yanan Wang, Jianguo Zhou Vulnerability analysis and optimization of power communication network. Search on Bibsonomy RACS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
13Khalid Mahmood Malik, Hafiz Malik, Roland Baumann Towards Vulnerability Analysis of Voice-Driven Interfaces and Countermeasures for Replay Attacks. Search on Bibsonomy MIPR The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
13Liang Ma Vulnerability Analysis of China's Railway Express Freight Transportation as a Complex Network Problem. Search on Bibsonomy CSAE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 406 (100 per page; Change: )
Pages: [1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license