Skip to search formSkip to main contentSkip to account menu

Attack surface

The attack surface of a software environment is the sum of the different points (the "attack vectors") where an unauthorized user (the "attacker… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Toys are an essential part of our culture, and they evolve as our technology evolves. Smart toys have been recently introduced in… 
2017
2017
In the area of testing, faults represent defects that occur during circuit manufacturing, or transient disturbances due to… 
2016
2016
Through the simplifying assumption that a Thing has a single use or a small number of intended uses, it is possible to reduce the… 
2016
2016
Evaluating an actor's `cyber power' is an inherently complex problem involving a laundry list of military, normative, and… 
2014
2014
We proposed an identity-based symmetric key authentication protocol using the Multiple-Key Blom's key agreement scheme as the… 
2013
2013
To protect large-scale power-grid critical infrastructures, efficient security and intrusion prevention techniques are required… 
2011
2011
  • 2011
  • Corpus ID: 35084271
Cryptanalysis is thus much more than mere codebreaking. Whereas in ancient times cryptography schemes only aimed to make messages… 
2011
2011
Security metrics are usually defined informally and, therefore, the rigourous analysis of these metrics is a hard task. This… 
2010
2010
Abstract : The purpose of this MBA project is to implement an effective solution to the DoD's mandatory January 2004 IUID policy…