Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,522,338 papers from all fields of science
Search
Sign In
Create Free Account
Attack patterns
In computer science, attack patterns are a group of rigorous methods for finding bugs or errors in code related to computer security. Attack patterns…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
21 relations
Authentication
Buffer overflow
Class diagram
Common Vulnerabilities and Exposures
Expand
Broader (1)
Software testing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Detection of attacks based on known vulnerabilities in industrial networked systems
M. Cheminod
,
L. Durante
,
Lucia Seno
,
A. Valenzano
Journal of Information Security and Applications
2017
Corpus ID: 2722547
2013
2013
A memory-based NFA regular expression match engine for signature-based intrusion detection
D. Pao
,
Nga Lam Or
,
R. Cheung
Computer Communications
2013
Corpus ID: 17955063
2012
2012
Automating Threat Modeling through the Software Development Life-Cycle
Guifré Ruiz
,
E. Heymann
,
Eduardo C´esar
,
B. Miller
2012
Corpus ID: 14252675
— Fixing software security issues early in the development life-cycle reduces its cost dramatically. Companies doing software…
Expand
2009
2009
A decision support system for constructing an alert classification model
Nien-Yi Jan
,
Shun-Chieh Lin
,
S. Tseng
,
Nancy P. Lin
Expert systems with applications
2009
Corpus ID: 28116540
Review
2009
Review
2009
Early Warning and Intrusion Detection based on Combined AI Methods
S. Edelkamp
,
C. Elfers
,
M. Horstmann
,
Marcus-Sebastian Schröder
,
K. Sohr
,
Thomas Wagner
2009
Corpus ID: 12613894
In this paper we survey the architecture and AI aspects in our project on early warningand intrusion detection based on combined…
Expand
2009
2009
On Simple Linear String Equations
Xiang Fu
,
Chung-Chih Li
,
K. Qian
2009
Corpus ID: 18403372
This paper presents a novel backward constraint solving technique for analyzing text processing programs. String constraints are…
Expand
2009
2009
Short-Exponent RSA
Hung-Min Sun
,
Chenguang Yang
,
Mu-En Wu
IEICE Transactions on Fundamentals of Electronics…
2009
Corpus ID: 7170098
In some applications, a short private exponent d is chosen to improve the decryption or signing process for RSA public key…
Expand
2008
2008
FPGA-based neuro-architecture intrusion detection system
A. Hassan
,
A. Elnakib
,
M. Abo-Elsoud
International Conference on Communication and…
2008
Corpus ID: 17656300
These daypsilas intrusion detection systems (IDSs) are playing an essential part of any network security system. A challenging…
Expand
2007
2007
SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures
R. A. Miura-Ko
,
N. Bambos
IEEE International Conference on Communications
2007
Corpus ID: 23548348
In this paper, we introduce a new scheme called SecureRank for prioritizing vulnerabilities to patch in computing systems…
Expand
2004
2004
DENIAL OF SERVICE ATTACKS AND SIP INFRASTRUCTURE Attack Scenarios and Prevention Mechanisms
D. Sisalem
,
J. Kuthan
,
G. Schäfer
2004
Corpus ID: 17302015
In this paper we address the issue of denial of service (DoS) attacks targeting the hardware and software of voice over IP…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE