Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,077,365 papers from all fields of science
Search
Sign In
Create Free Account
Vulnerability (computing)
Known as:
Security hole
, Vuln
, Software vulnerabilities
Expand
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Android
Application security
Arbitrary code execution
Attack patterns
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2013
Review
2013
A Survey on Smart Grid Communication Infrastructures: Motivations, Requirements and Challenges
Ye Yan
,
Y. Qian
,
H. Sharif
,
D. Tipper
IEEE Communications Surveys and Tutorials
2013
Corpus ID: 121289
A communication infrastructure is an essential part to the success of the emerging smart grid. A scalable and pervasive…
Expand
Highly Cited
2013
Highly Cited
2013
Characterizing hypervisor vulnerabilities in cloud computing servers
Diego Perez-Botero
,
Jakub Szefer
,
R. Lee
Cloud Computing
2013
Corpus ID: 6909552
The rise of the Cloud Computing paradigm has led to security concerns, taking into account that resources are shared and mediated…
Expand
Highly Cited
2007
Highly Cited
2007
The Severity of Supply Chain Disruptions: Design Characteristics and Mitigation Capabilities
C. Craighead
,
Jennifer Blackhurst
,
M. Rungtusanatham
,
R. Handfield
Decision Sciences
2007
Corpus ID: 205735245
Supply chain disruptions and the associated operational and financial risks represent the most pressing concern facing firms that…
Expand
Review
2007
Review
2007
Risk and vulnerability indicators at different scales: Applicability, usefulness and policy implications
J. Birkmann
2007
Corpus ID: 52204943
Highly Cited
2007
Highly Cited
2007
Climate change: linking adaptation and mitigation through agroforestry
L. Verchot
,
M. Noordwijk
,
+7 authors
C. Palm
2007
Corpus ID: 39415614
Agriculture is the human enterprise that is most vulnerable to climate change. Tropical agriculture, particularly subsistence…
Expand
Highly Cited
2005
Highly Cited
2005
Finding Security Vulnerabilities in Java Applications with Static Analysis
B. Livshits
,
M. Lam
USENIX Security Symposium
2005
Corpus ID: 8766314
This paper proposes a static analysis technique for detecting many recently discovered application vulnerabilities such as SQL…
Expand
Highly Cited
2004
Highly Cited
2004
TinySec: a link layer security architecture for wireless sensor networks
Chris Karlof
,
N. Sastry
,
D. Wagner
ACM International Conference on Embedded…
2004
Corpus ID: 7438327
We introduce TinySec, the first fully-implemented link layer security architecture for wireless sensor networks. In our design…
Expand
Highly Cited
2003
Highly Cited
2003
Comparing passwords, tokens, and biometrics for user authentication
L. O'Gorman
Proceedings of the IEEE
2003
Corpus ID: 11397126
For decades, the password has been the standard means for user authentication on computers. However, as users are required to…
Expand
Review
2003
Review
2003
Buffer overflows: attacks and defenses for the vulnerability of the decade
Crispin Cowan
,
Perry Wagle
,
C. Pu
,
Steve Beattie
,
J. Walpole
Foundations of Intrusion Tolerant Systems…
2003
Corpus ID: 7280713
Buffer overflows have been the most common form of security vulnerability for the last ten years. More over, buffer overflow…
Expand
Highly Cited
1989
Highly Cited
1989
Editorial Introduction: Vulnerability, Coping and Policy
R. Chambers
1989
Corpus ID: 55894019
¡OS fjullcq,n. vol 20 no 2. Inst tute of Des elopntent Sitahes, Sussex these flows. Indicators of poverty are then easily taken…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE