Skip to search formSkip to main contentSkip to account menu

Attack surface

The attack surface of a software environment is the sum of the different points (the "attack vectors") where an unauthorized user (the "attacker… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
The existence of a security vulnerability in a system does not necessarily mean that it can be exploited. In this research, we… 
2017
2017
Honeypots are decoy cyberdefense systems placed in a network to entice malicious entities into attacking in order to waste… 
2017
2017
In the area of testing, faults represent defects that occur during circuit manufacturing, or transient disturbances due to… 
2016
2016
Context Integrity Measurement Architecture (CIMA) was inspired by risk assessments used by credit card companies. These… 
2016
2016
Through the simplifying assumption that a Thing has a single use or a small number of intended uses, it is possible to reduce the… 
2014
2014
We proposed an identity-based symmetric key authentication protocol using the Multiple-Key Blom's key agreement scheme as the… 
2013
2013
To protect large-scale power-grid critical infrastructures, efficient security and intrusion prevention techniques are required… 
2012
2012
Solid particle admission is one of the principal damage and failure mechanisms in turbomachines such as gas turbines, axial, and… 
2009
2009
With the broadening possibilities and the ever-growing number of computer users, many applications are being developed that have…