Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,434,873 papers from all fields of science
Search
Sign In
Create Free Account
Attack surface
The attack surface of a software environment is the sum of the different points (the "attack vectors") where an unauthorized user (the "attacker…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
20 relations
ARM architecture
Attack Surface Analyzer
Browser security
Cloud storage
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities
Noam Moscovich
,
Ron Bitton
,
+5 authors
A. Shabtai
arXiv.org
2020
Corpus ID: 220280420
The existence of a security vulnerability in a system does not necessarily mean that it can be exploited. In this research, we…
Expand
2017
2017
Intrusion Detection for Smart Grid Communication Systems
Brycent Chatfield
2017
Corpus ID: 114169102
Transformation of the traditional power grid into a smart grid hosts an array of vulnerabilities associated with communication…
Expand
2016
2016
Cyber and physical threats to the internet of everything
G. Loukas
,
C. Patrikakis
2016
Corpus ID: 55308809
After over 40 years of the Internet faithfully serving the needs of the Earth’s human population for information, communication…
Expand
2014
2014
On the Security of Holder-of-Key Single Sign-On
Andreas Mayer
,
Vladislav Mladenov
,
Jörg Schwenk
Sicherheit
2014
Corpus ID: 14591421
Web Single Sign-On (SSO) is a valuable point of attack because it provides access to multiple resources once a user has initially…
Expand
2013
2013
TSB: Trusted sensing base for the power grid
A. Mazloomzadeh
,
O. Mohammed
,
S. Zonouz
IEEE International Conference on Smart Grid…
2013
Corpus ID: 3595759
To protect large-scale power-grid critical infrastructures, efficient security and intrusion prevention techniques are required…
Expand
2012
2012
Identity-Based Internet Protocol Network
G. Nakamoto
,
R. Durst
,
+5 authors
D. Pisano
2012
Corpus ID: 6546627
The Identity-Based Internet Protocol (IBIP) Network project is experimenting with a new enterprise oriented network architecture…
Expand
2012
2012
Securing a femtocell-based location service
Jack Brassil
,
P. Manadhata
International Conference on Selected Topics in…
2012
Corpus ID: 5801824
Mobile device users are increasingly incented to falsify their locations to retain location privacy while capturing economic…
Expand
2011
2011
Cryptanalysis vs. Reality
2011
Corpus ID: 35084271
Cryptanalysis is thus much more than mere codebreaking. Whereas in ancient times cryptography schemes only aimed to make messages…
Expand
2010
2010
Item Unique Identification (IUID) marking for a littoral combat ship (LCS) class mission module (MM) at the mission package support facility (MPSF): implementation analysis and development of optimal…
W. Goodman
,
Roland Rodríguez
,
Isaia Benette E. Infante
2010
Corpus ID: 109737031
Abstract : The purpose of this MBA project is to implement an effective solution to the DoD's mandatory January 2004 IUID policy…
Expand
2009
2009
IS THERE A LAWYER IN THE LAB
J. Malcho
2009
Corpus ID: 55213366
With the broadening possibilities and the ever-growing number of computer users, many applications are being developed that have…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE