Skip to search formSkip to main contentSkip to account menu

Attack surface

The attack surface of a software environment is the sum of the different points (the "attack vectors") where an unauthorized user (the "attacker… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2020
Review
2020
In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains… 
Review
2019
Review
2019
In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains… 
Highly Cited
2018
Highly Cited
2018
Review
2016
Review
2016
Information-centric networking (ICN) replaces the widely used host-centric networking paradigm in communication networks (e.g… 
Highly Cited
2016
Highly Cited
2016
Advances in machine learning (ML) in recent years have enabled a dizzying array of applications such as data analytics… 
Highly Cited
2012
Highly Cited
2012
FPGA manufacturers have offered devices with bitstream protection for a number of years. This feature is currently primarily used… 
Highly Cited
2009
Highly Cited
2009
Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle… 
Highly Cited
2005
Highly Cited
2005
We propose a metric for determining whether one version of a system is more secure than another with respcct to a fixed set of…