Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,257,086 papers from all fields of science
Search
Sign In
Create Free Account
Attack surface
The attack surface of a software environment is the sum of the different points (the "attack vectors") where an unauthorized user (the "attacker…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
20 relations
ARM architecture
Attack Surface Analyzer
Browser security
Cloud storage
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
The Impact of Time on DNS Security
Aanchal Malhotra
,
W. Toorop
,
B. Overeinder
,
Ralph Dolmans
,
S. Goldberg
IACR Cryptology ePrint Archive
2019
Corpus ID: 198185917
,
2017
2017
Security Requirements for Smart Toys
L. G. D. Carvalho
,
M. Eler
International Conference on Enterprise…
2017
Corpus ID: 44637759
Toys are an essential part of our culture, and they evolve as our technology evolves. Smart toys have been recently introduced in…
Expand
2017
2017
Counteracting malicious faults in cryptographic circuits
I. Polian
,
F. Regazzoni
IEEE European Test Symposium
2017
Corpus ID: 8122365
In the area of testing, faults represent defects that occur during circuit manufacturing, or transient disturbances due to…
Expand
2016
2016
Slinging MUD: Manufacturer usage descriptions: How the network can protect things
E. Lear
,
B. Weis
International Conference on Selected Topics in…
2016
Corpus ID: 6984746
Through the simplifying assumption that a Thing has a single use or a small number of intended uses, it is possible to reduce the…
Expand
2016
2016
The social side of ‘cyber power’? Social media and cyber operations
Drew Herrick
International Conference on Cyber Conflict
2016
Corpus ID: 24688051
Evaluating an actor's `cyber power' is an inherently complex problem involving a laundry list of military, normative, and…
Expand
2014
2014
An identity-based authentication protocol for sensor networks
M. Yang
,
A. Al-Anbuky
,
William Liu
International Conference on Intelligent Sensors…
2014
Corpus ID: 16353404
We proposed an identity-based symmetric key authentication protocol using the Multiple-Key Blom's key agreement scheme as the…
Expand
2013
2013
TSB: Trusted sensing base for the power grid
A. Mazloomzadeh
,
O. Mohammed
,
S. Zonouz
IEEE International Conference on Smart Grid…
2013
Corpus ID: 3595759
To protect large-scale power-grid critical infrastructures, efficient security and intrusion prevention techniques are required…
Expand
2011
2011
Cryptanalysis vs. Reality
2011
Corpus ID: 35084271
Cryptanalysis is thus much more than mere codebreaking. Whereas in ancient times cryptography schemes only aimed to make messages…
Expand
2011
2011
Formal Analysis of Security Metrics and Risk
Leanid Krautsevich
,
F. Martinelli
,
A. Yautsiukhin
Workshop in Information Security Theory and…
2011
Corpus ID: 6686430
Security metrics are usually defined informally and, therefore, the rigourous analysis of these metrics is a hard task. This…
Expand
2010
2010
Item Unique Identification (IUID) marking for a littoral combat ship (LCS) class mission module (MM) at the mission package support facility (MPSF): implementation analysis and development of optimal…
W. Goodman
,
Roland Rodríguez
,
Isaia Benette E. Infante
2010
Corpus ID: 109737031
Abstract : The purpose of this MBA project is to implement an effective solution to the DoD's mandatory January 2004 IUID policy…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE