Skip to search formSkip to main contentSkip to account menu

Vulnerability (computing)

Known as: Security hole, Vuln, Software vulnerabilities 
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2013
Review
2013
A communication infrastructure is an essential part to the success of the emerging smart grid. A scalable and pervasive… 
Highly Cited
2013
Highly Cited
2013
The rise of the Cloud Computing paradigm has led to security concerns, taking into account that resources are shared and mediated… 
Highly Cited
2007
Highly Cited
2007
Supply chain disruptions and the associated operational and financial risks represent the most pressing concern facing firms that… 
Highly Cited
2007
Highly Cited
2007
Agriculture is the human enterprise that is most vulnerable to climate change. Tropical agriculture, particularly subsistence… 
Highly Cited
2005
Highly Cited
2005
This paper proposes a static analysis technique for detecting many recently discovered application vulnerabilities such as SQL… 
Highly Cited
2004
Highly Cited
2004
We introduce TinySec, the first fully-implemented link layer security architecture for wireless sensor networks. In our design… 
Highly Cited
2003
Highly Cited
2003
For decades, the password has been the standard means for user authentication on computers. However, as users are required to… 
Review
2003
Review
2003
Buffer overflows have been the most common form of security vulnerability for the last ten years. More over, buffer overflow… 
Highly Cited
1989
Highly Cited
1989
¡OS fjullcq,n. vol 20 no 2. Inst tute of Des elopntent Sitahes, Sussex these flows. Indicators of poverty are then easily taken…