The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Vulnerability Assessment (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1996-2004 (33) 2005 (25) 2006 (24) 2007 (28) 2008 (29) 2009 (26) 2010 (24) 2011 (24) 2012 (27) 2013 (32) 2014 (28) 2015 (41) 2016 (46) 2017 (35) 2018 (48) 2019 (49)
Publication types (Num. hits)
article(96) incollection(4) inproceedings(399) phdthesis(4) proceedings(16)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 105 occurrences of 75 keywords

Results
Found 519 publication records. Showing 519 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
121HyungJong Kim, KyungHee Koh, DongHoon Shin, HongGeun Kim Vulnerability Assessment Simulation for Information Infrastructure Protection. Search on Bibsonomy InfraSec The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Knowledge-Based Simulation, Modeling and Simulation, Vulnerability Analysis, Information Infrastructure, Vulnerability Assessment
114Youngsup Kim, Seung Yub Baek, Geuk Lee Intelligent Tool for Enterprise Vulnerability Assessment on a Distributed Network Environment Using Nessus and OVAL. Search on Bibsonomy KES (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
114Fanglu Guo, Yang Yu, Tzi-cker Chiueh Automated and Safe Vulnerability Assessment. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
85Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan An OVAL-based active vulnerability assessment system for enterprise computer networks. Search on Bibsonomy Information Systems Frontiers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Open vulnerability assessment language, Attack path, Network security, Relational database management system, Predicate logic, Security vulnerability
70Cuisong Yu, Zhenchun Hao, Jiahu Wang, Zhenhua Wang, Shouchang Hao Based on Fuzzy Clustering Theory: Vulnerability Classification Research of Water Resources System. Search on Bibsonomy FSKD (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
70Haitao Tian, Liusheng Huang, Zhi Zhou, Hui Zhang Common Vulnerability Markup Language. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
65Aaron Steele Ontological Vulnerability Assessment. Search on Bibsonomy WISE Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
64Ching-Huang Lin, Chih-Hao Chen, Chi-Sung Laih A Study and Implementation of Vulnerability Assessment and Misconfiguration Detection. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
62Giorgos Valvis, Despina Polemi An XML-Based Data Model for Vulnerability Assessment Reports. Search on Bibsonomy I3E The full citation details ... 2005 DBLP  DOI  BibTeX  RDF XML modeling, Vulnerability assessment
61Young-Ju Han, Jin S. Yang, Beom-Hwan Chang, Jung C. Na, Tai-Myung Chung The Vulnerability Assessment for Active Networks; Model, Policy, Procedures, and Performance Evaluations. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
60Geuk Lee, Youngsup Kim, Sang-Jo Youk Development of Oval Based Vulnerability Management Tool (OVMT) on a Distributed Network Environment. Search on Bibsonomy KES (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
46Hoon-Jae Lee 0001, ManKi Ahn, Seongan Lim, Sang-Jae Moon A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Protection Profiles, Vulnerability Assessment Activities, SPA/DPA, Smart Card, Side Channel Attacks, Common Criteria
45Pavel Propastin Monitoring System for Assessment of Vegetation Sensitivity to El-Niño over Africa. Search on Bibsonomy AGILE Conf. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
42Geuk Lee, Il Seok Ko, Tai-Hoon Kim A Vulnerability Assessment Tool Based on OVAL in System Block Model. Search on Bibsonomy ICIC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Youngmi Kwon, Hui Jae Lee, Geuk Lee A Vulnerability Assessment Tool Based on OVAL in Linux System. Search on Bibsonomy NPC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
42Ronda R. Henning Vulnerability Assessment in Wireless Network. Search on Bibsonomy SAINT Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
39Antonio Bruno Della Rocca, Grazia Fattoruso, Sergio Lo Curzio, Francesco Pasanisi, Raffaele Pica, Alessandro Peloso, Maurizio Pollino, Carlo Tebano, Alfredo Trocciola, Davide De Chiara, Genoveffa Tortora SISI Project: Developing GIS-Based Tools for Vulnerability Assessment. Search on Bibsonomy VISUAL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Geoprocessing tools, GIS, Vulnerability Assessment
39Julien Budynek, Eric Bonabeau, Ben Shargel Evolving computer intrusion scripts for vulnerability assessment and log analysis. Search on Bibsonomy GECCO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF script kiddies, agent-based model, log analysis, hacker, vulnerability assessment
39Kameswari Kotapati, Peng Liu, Thomas F. La Porta CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
39Igor V. Kotenko, Mikhail Stepashkin Attack Graph Based Evaluation of Network Security. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Network security, Risk Assessment, Security Metrics, Vulnerability Assessment, Network attacks
35Rui Costa Cardoso, Mário M. Freire Intelligent Assessment of Distributed Security in TCP/IP Networks. Search on Bibsonomy HSNMC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
35Raymond C. Parks, Edmond Rogers Vulnerability Assessment for Critical Infrastructure Control Systems. Search on Bibsonomy IEEE Security & Privacy The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Madhusudhanan Chandrasekaran, Mukarram Baig, Shambhu J. Upadhyaya AVARE: aggregated vulnerability assessment and response against zero-day exploits. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Kameswari Kotapati, Peng Liu, Thomas F. La Porta Evaluating MAPSec by marking attack graphs. Search on Bibsonomy Wireless Networks The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security protocol evaluation, MAPSec evaluation, eCAT, Mobile telecommunication networks, Attack graphs, Vulnerability assessment
35Kameswari Kotapati, Peng Liu, Thomas F. La Porta Dependency relation based vulnerability analysis of 3G networks: Can it identify unforeseen cascading attacks? Search on Bibsonomy Telecommunication Systems The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Mobile telecommunication networks, Cascading attacks, Infection propagation rules, 3G networks, Vulnerability assessment, Dependency model
35Per Mellstrand, Rune Gustavsson Experiment Based Validation of CIIP. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Resilient Software, Critical Infrastructures, Vulnerability Assessment
34Daniel Lincke, Patrik Jansson, Marcin Zalewski, Cezar Ionescu Generic Libraries in C++ with Concepts from High-Level Domain Descriptions in Haskell. Search on Bibsonomy DSL The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Guiomar Corral, Eva Armengol, Albert Fornells-Herrera, Elisabet Golobardes Data Security Analysis Using Unsupervised Learning and Explanations. Search on Bibsonomy Innovations in Hybrid Intelligent Systems The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Clustering, Network Security, Unsupervised Learning, Explanations
34Yohann Thomas, Hervé Debar, Benjamin Morin Improving Security Management through Passive Network Observation. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Madhusudhanan Chandrasekaran, Mukarram Baig, Shambhu J. Upadhyaya AEGIS: A Proactive Methodology to Shield against Zero-Day Exploits. Search on Bibsonomy AINA Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Su Zhang, Xinming Ou, John Homer Effective Network Vulnerability Assessment through Model Abstraction. Search on Bibsonomy DIMVA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
30Yonesy F. Nunez Maximizing an Organization's Information Security Posture by Distributedly Assessing and Remedying System Vulnerabilities. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Sun-myung Hwang A Vulnerability Check in System Block. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Edgar C. Portante, Thomas N. Taxon, James A. Kavicky, Tarek Abdallah, Timothy K. Perkins Linear modeling and simulation of low-voltage electric system for single-point vulnerability assessment of military installation. Search on Bibsonomy Winter Simulation Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Simon Liu, Larry Holt, Bruce Cheng A Practical Vulnerability Assessment Program. Search on Bibsonomy IT Professional The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Romain Lardy Calcul intensif pour l'évaluation de la vulnérabilité en utilisant une approche d'Ingénierie Dirigée par les Modèles: application à la vulnérabilité des prairies au changement climatique sous contraintes de plans d'expériences. (Intensive calculation for vulnerability assessment using a Model Driven Engineering approach: application to prairie vulnerability to climate change under experimental design constraints). Search on Bibsonomy 2013   RDF
23Philip Chan, Mo Mansuri, Hong Man Applying Systems Engineering in Tactical Wireless Network Analysis with Bayesian Networks. Search on Bibsonomy CICSyN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Wireless Network Analysis, Bayesian Networks, Systems Engineering, Vulnerability Assessment
23Virginia N. L. Franqueira, Raul H. C. Lopes, Pascal van Eck Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hypergraph, attack graph, vulnerability assessment, network attack
23Scott O'Hare, Steven Noel, Kenneth Prole A Graph-Theoretic Visualization Approach to Network Risk Analysis. Search on Bibsonomy VizSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF exploit analysis, visualization, network security, situational awareness, attack graph, vulnerability assessment
23Paul A. Karger, Roger R. Schell Thirty Years Later: Lessons from the Multics Security Evaluation. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
21Trisha Anne Cayetano, Averyl Dogao, Cristopher Guipoc, Thelma D. Palaoag Cyber-Physical IT Assessment Tool and Vulnerability Assessment for Semiconductor Companies. Search on Bibsonomy ICCSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Vipin Swarup, Sushil Jajodia, Joseph Pamula Rule-Based Topological Vulnerability Analysis. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Annalisa Greco, Alessandro Pluchino, Luca Barbarossa, Giovanni Barreca, Ivo Caliò, Francesco Martinico, Andrea Rapisarda A New Agent-Based Methodology for the Seismic Vulnerability Assessment of Urban Areas. Search on Bibsonomy ISPRS Int. J. Geo-Information The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Junnan Xiong, Jin Li, Weiming Cheng, Nan Wang, Liang Guo A GIS-Based Support Vector Machine Model for Flash Flood Vulnerability Assessment and Mapping in China. Search on Bibsonomy ISPRS Int. J. Geo-Information The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Isil Oz, Haluk Rahmi Topcuoglu, Oguz Tosun A user-assisted thread-level vulnerability assessment tool. Search on Bibsonomy Concurrency and Computation: Practice and Experience The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Tianlei Zang, Jieyu Lei, Xiaoguang Wei, Tao Huang 0002, Tao Wang 0029, Mario J. Pérez-Jiménez, Hua Lin Adjacent Graph Based Vulnerability Assessment for Electrical Networks Considering Fault Adjacent Relationships Among Branches. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Rajendra Patil, Chirag Modi Designing an efficient framework for vulnerability assessment and patching (VAP) in virtual environment of cloud computing. Search on Bibsonomy The Journal of Supercomputing The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Chenchen Ji, Peng Yu 0001, Wenjing Li, Puyuan Zhao Comprehensive vulnerability assessment and optimisation method of power communication network. Search on Bibsonomy IJES The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Tianlei Zang, Shibin Gao, Baoxu Liu, Tao Huang 0002, Tao Wang 0029, Xiaoguang Wei Integrated fault propagation model based vulnerability assessment of the electrical cyber-physical system under cyber attacks. Search on Bibsonomy Rel. Eng. & Sys. Safety The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Fei Wang, Xia-zhong Zheng, Nan Li 0014, Xuesong Shen Systemic vulnerability assessment of urban water distribution networks considering failure scenario uncertainty. Search on Bibsonomy IJCIP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Dean Richard McKinnel, Tooska Dargahi, Ali Dehghantanha, Kim-Kwang Raymond Choo A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment. Search on Bibsonomy Computers & Electrical Engineering The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Pietro Russo, Alberto Caponi, Marco Leuti, Giuseppe Bianchi 0001 A Web Platform for Integrated Vulnerability Assessment and Cyber Risk Management. Search on Bibsonomy Information The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar Vulnerability Assessment of N-1 Reliable Power Systems to False Data Injection Attacks. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
16Cunlai Pu, Pang Wu Vulnerability Assessment of Power Grids Based on Both Topological and Electrical Properties. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
16Xiaoning Du, Bihuan Chen 0001, Yuekang Li, Jianmin Guo, Yaqin Zhou, Yang Liu 0003, Yu Jiang LEOPARD: Identifying Vulnerable Code for Vulnerability Assessment through Program Metrics. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
16Ernesto Rosario Russo, Andrea Di Sorbo, Corrado Aaron Visaggio, Gerardo Canfora Summarizing vulnerabilities' descriptions to support experts during vulnerability assessment activities. Search on Bibsonomy Journal of Systems and Software The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Andrzej Bialas Vulnerability Assessment of Sensor Systems. Search on Bibsonomy Sensors The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Yannis Nikoloudakis, Evangelos Pallis, George Mastorakis, Constandinos X. Mavromoustakis, Charalabos Skianis, Evangelos K. Markakis Vulnerability assessment as a service for fog-centric ICT ecosystems: A healthcare use case. Search on Bibsonomy Peer-to-Peer Networking and Applications The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Yazdan Movahedi, Michel Cukier, Ambrose Andongabo, Ilir Gashi Cluster-based vulnerability assessment of operating systems and web browsers. Search on Bibsonomy Computing The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Rohit Negi, Parvin Kumar, Shibashis Ghosh, Sandeep K. Shukla, Ashish Gahlot Intern Vulnerability Assessment and Mitigation for Industrial Critical Infrastructures with Cyber Physical Test Bed. Search on Bibsonomy ICPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Noor Ahmad Hazari, Ahmed Oun, Mohammed Niamat Analysis and Machine Learning Vulnerability Assessment of XOR-Inverter based Ring Oscillator PUF Design. Search on Bibsonomy MWSCAS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Andrzej Bialas Structurization of the Common Criteria Vulnerability Assessment Process. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Bouakkaz Khaled Salim, Dehni Abdellatif, Meguenni Bouhadjar, Kessar Cherif GIS Application for Groundwater Vulnerability Assessment: Study Case of Hammam-Bou-hadjar Area-NW of Algeria. Search on Bibsonomy GISTAM The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Godwin Raju, Pavol Zavarsky, Adetokunbo Makanju, Yasir Malik Vulnerability assessment of machine learning based malware classification models. Search on Bibsonomy GECCO (Companion) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Roberto Perdisci, Clémentine Maurice, Giorgio Giacinto, Magnus Almgren (eds.) Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Kyriakos Kritikos, Manos Papoutsakis, Sotiris Ioannidis, Kostas Magoutis Towards Configurable Vulnerability Assessment in the Cloud. Search on Bibsonomy CAMAD The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Xiaoning Du, Bihuan Chen 0001, Yuekang Li, Jianmin Guo, Yaqin Zhou, Yang Liu 0003, Yu Jiang Leopard: identifying vulnerable code for vulnerability assessment through program metrics. Search on Bibsonomy ICSE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Triet Huynh Minh Le, Bushra Sabir, Muhammad Ali Babar Automated software vulnerability assessment with concept drift. Search on Bibsonomy MSR The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Aidan Beggs, Alexandros Kapravelos Wild Extensions: Discovering and Analyzing Unlisted Chrome Extensions. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Yoshihiro Oyama How Does Malware Use RDTSC? A Study on Operations Executed by Malware with CPU Cycle Measurement. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Hyunguk Yoo, Sushma Kalle, Jared Smith, Irfan Ahmed Overshadow PLC to Detect Remote Control-Logic Injection Attacks. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Ziya Alper Genç, Gabriele Lenzini, Daniele Sgandurra On Deception-Based Protection Against Cryptographic Ransomware. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Adam Portier, Henry Carter, Charles Lever Security in Plain TXT - Observing the Use of DNS TXT Records in the Wild. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Marius Musch, Christian Wressnegger, Martin Johns, Konrad Rieck New Kid on the Web: A Study on the Prevalence of WebAssembly in the Wild. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Davide Fauri, Michail Kapsalakis, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle Role Inference + Anomaly Detection = Situational Awareness in BACnet Networks. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Zhenyu Ning, Fengwei Zhang, Stephen Remias Understanding the Security of Traffic Signal Infrastructure. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Michael Schwarz 0001, Samuel Weiser, Daniel Gruss Practical Enclave Malware with Intel SGX. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Nilo Redini, Ruoyu Wang 0001, Aravind Machiry, Yan Shoshitaishvili, Giovanni Vigna, Christopher Kruegel BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Constantinos Diomedous, Elias Athanasopoulos Practical Password Hardening Based on TLS. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Luca Massarelli, Giuseppe Antonio Di Luna, Fabio Petroni, Roberto Baldoni, Leonardo Querzoni SAFE: Self-Attentive Function Embeddings for Binary Similarity. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Alwin Maier, Hugo Gascon, Christian Wressnegger, Konrad Rieck TypeMiner: Recovering Types in Binary Programs Using Machine Learning. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Taejune Park, Yeonkeun Kim, Vinod Yegneswaran, Phillip A. Porras, Zhaoyan Xu, KyoungSoo Park, Seungwon Shin DPX: Data-Plane eXtensions for SDN Security Service Instantiation. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Denis Ugarte, Davide Maiorca, Fabrizio Cara, Giorgio Giacinto PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Beliz Kaleli, Manuel Egele, Gianluca Stringhini On the Perils of Leaking Referrers in Online Collaboration Services. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Pierre Laperdrix, Gildas Avoine, Benoit Baudry, Nick Nikiforakis Morellian Analysis for Browsers: Making Web Authentication Stronger with Canvas Fingerprinting. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Dennis Tatang, Carl Schneider, Thorsten Holz Large-Scale Analysis of Infrastructure-Leaking DNS Servers. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Matthias Neugschwandtner, Alessandro Sorniotti, Anil Kurmus Memory Categorization: Separating Attacker-Controlled Data. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Stefan Mehner, Hartmut König No Need to Marry to Change Your Name! Attacking Profinet IO Automation Networks Using DCP. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Iaroslav Gridin, Cesar Pereida García, Nicola Tuveri, Billy Bob Brumley Triggerflow: Regression Testing by Advanced Execution Path Inspection. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Olivier Cabana, Amr M. Youssef, Mourad Debbabi, Bernard Lebel, Marthe Kassouf, Basile L. Agba Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Federico Maggi, Marco Balduzzi, Jonathan Andersson, Philippe Lin, Stephen Hilt, Akira Urano, Rainer Vosseler A Security Evaluation of Industrial Radio Remote Controllers. Search on Bibsonomy DIMVA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Mohsen Alizadeh, Mazlan Hashim, Esmaeil Alizadeh, Himan Shahabi, Mohammad Reza Karami, Amin Beiranvand Pour, Biswajeet Pradhan, Hassan Zabihi Multi-Criteria Decision Making (MCDM) Model for Seismic Vulnerability Assessment (SVA) of Urban Residential Buildings. Search on Bibsonomy ISPRS Int. J. Geo-Information The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Mohsen Alizadeh, Ibrahim Ngah, Mazlan Hashim, Biswajeet Pradhan, Amin Beiranvand Pour A Hybrid Analytic Network Process and Artificial Neural Network (ANP-ANN) Model for Urban Earthquake Vulnerability Assessment. Search on Bibsonomy Remote Sensing The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Huan Wang 0006, Zhanfang Chen, Jianping Zhao, Xiaoqiang Di, Dan Liu A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow. Search on Bibsonomy IEEE Access The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Xiaoge Huang, Zhijun Qin, Hui Liu A Survey on Power Grid Cyber Security: From Component-Wise Vulnerability Assessment to System-Wide Impact Analysis. Search on Bibsonomy IEEE Access The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Vishal Sharma, Gaurav Choudhary, Yongho Ko, Ilsun You Behavior and Vulnerability Assessment of Drones-Enabled Industrial Internet of Things (IIoT). Search on Bibsonomy IEEE Access The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Francesca Argenti, Gabriele Landucci, Genserik Reniers, Valerio Cozzani Vulnerability assessment of chemical facilities to intentional attacks based on Bayesian Network. Search on Bibsonomy Rel. Eng. & Sys. Safety The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Jiakun Fang, Chi Su, Zhe Chen 0007, Haishun Sun, Per Lund Power System Structural Vulnerability Assessment Based on an Improved Maximum Flow Approach. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Luca Allodi, Sebastian Banescu, Henning Femmer, Kristian Beckers Identifying Relevant Information Cues for Vulnerability Assessment Using CVSS. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
16James Boyden, Penelope Wurm, Karen E. Joyce, Guy S. Boggs A spatial vulnerability assessment of monsoonal wetland habitats to para grass invasion in Kakadu National Park, northern Australia. Search on Bibsonomy Int. J. Applied Earth Observation and Geoinformation The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 519 (100 per page; Change: )
Pages: [1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license