Skip to search formSkip to main contentSkip to account menu

Common Vulnerabilities and Exposures

Known as: CAN Number, CVE number, CVE ID 
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
To share vulnerability information across separate databases, tools, and services, newly identified vulnerabilities are… 
Highly Cited
2014
Highly Cited
2014
Mistakes in cryptographic software implementations often undermine the strong security guarantees offered by cryptography. This… 
Highly Cited
2014
Highly Cited
2014
We present a system, RCV, for enabling software applications to survive divide-by-zero and null-dereference errors. RCV operates… 
Highly Cited
2012
Highly Cited
2012
A bstractWe show using diagramtic arguments that in some (but not all) cases, the temperature dependent part of the chiral… 
Highly Cited
2005
Highly Cited
2005
Collaborative virtual environments (CVEs) hold great potential for people With autism. An exploratory empirical study Was… 
Highly Cited
2003
Highly Cited
2003
Many tasks require teamwork. Team members may work concurrently, but there must be some occasions of coming together… 
Review
2003
Review
2003
This paper presents results of the longitudinal usability and network trials that took place throughout the COVEN (COllaborative… 
Review
1994
Review
1994
Increasing concentrations of atmospheric CO2 could have dramatic effects upon terrestrial ecosystems including changes in… 
Review
1985