Skip to search formSkip to main contentSkip to account menu

Attack surface

The attack surface of a software environment is the sum of the different points (the "attack vectors") where an unauthorized user (the "attacker… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
The existence of a security vulnerability in a system does not necessarily mean that it can be exploited. In this research, we… 
2017
2017
Transformation of the traditional power grid into a smart grid hosts an array of vulnerabilities associated with communication… 
2016
2016
After over 40 years of the Internet faithfully serving the needs of the Earth’s human population for information, communication… 
2014
2014
Web Single Sign-On (SSO) is a valuable point of attack because it provides access to multiple resources once a user has initially… 
2013
2013
To protect large-scale power-grid critical infrastructures, efficient security and intrusion prevention techniques are required… 
2012
2012
The Identity-Based Internet Protocol (IBIP) Network project is experimenting with a new enterprise oriented network architecture… 
2012
2012
Mobile device users are increasingly incented to falsify their locations to retain location privacy while capturing economic… 
2011
2011
  • 2011
  • Corpus ID: 35084271
Cryptanalysis is thus much more than mere codebreaking. Whereas in ancient times cryptography schemes only aimed to make messages… 
2010
2010
Abstract : The purpose of this MBA project is to implement an effective solution to the DoD's mandatory January 2004 IUID policy… 
2009
2009
With the broadening possibilities and the ever-growing number of computer users, many applications are being developed that have…