Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,300 papers from all fields of science
Search
Sign In
Create Free Account
Flaw hypothesis methodology
Known as:
Flaw
Flaw hypothesis methodology is a systems analysis and penetration prediction technique where a list of hypothesized flaws in a system are compiled…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Broader (1)
Computer security
Penetration test
Trusted Computer System Evaluation Criteria
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
On the anonymity of some authentication schemes for wireless communications
Peng Zeng
,
Z. Cao
,
Kim-Kwang Raymond Choo
,
Shengbao Wang
IEEE Communications Letters
2009
Corpus ID: 17431817
In 2004, Zhu and Ma proposed a new and efficient authentication scheme claiming to provide anonymity for wireless environments…
Expand
Highly Cited
2004
Highly Cited
2004
Remarks on fingerprint-based remote user authentication scheme using smart cards
Chinchen Chang
,
I. Lin
OPSR
2004
Corpus ID: 32388619
In 2002, Lee, Ryu, and Yoo proposed a fingerprint-based remote user authentication scheme using smart cards. The scheme makes it…
Expand
Highly Cited
2002
Highly Cited
2002
SGBEM (for Cracked Local Subdomain) -- FEM (for uncracked global Structure) Alternating Method for Analyzing 3D Surface Cracks and Their Fatigue-Growth
Z. Han
,
S. Atluri
2002
Corpus ID: 3658088
As shown in an earlier work, the FEM-BEM alternating method is an efficient and accurate method for fracture analysis. In the…
Expand
Highly Cited
2002
Highly Cited
2002
INDUCTWISE: inductance-wise interconnect simulator and extractor
Tsung-Hao Chen
,
C. Luk
,
C. C. Chen
IEEE/ACM International Conference on Computer…
2002
Corpus ID: 814966
We have developed a robust, efficient, and accurate tool, which integrates inductance extraction and simulation, called…
Expand
Highly Cited
2001
Highly Cited
2001
Amphibians and Reptiles of the Hashemite Kingdom of Jordan, An Atlas and Field Guide
D. Modrý
,
P. Nečas
,
A. Disi
2001
Corpus ID: 52198807
Amphibians and Reptiles of the Hashemite Kingdom of Jordan: An Atlas and Field Guide. Ahmad M. Disi, David Modrý, Petr Necas and…
Expand
Highly Cited
2001
Highly Cited
2001
Minimum expected cost-oriented optimal maintenance planning for deteriorating structures: application to concrete bridge decks
A. Estes
,
D. Frangopol
Reliability Engineering & System Safety
2001
Corpus ID: 834977
Highly Cited
2000
Highly Cited
2000
Role of adhesive interlayer in transverse fracture of brittle layer structures
H. Chai
,
B. Lawn
2000
Corpus ID: 11547374
The role of a soft adhesive interlayer in determining critical conditions for fracture in brittle layer structures from…
Expand
1993
1993
Integrated Segmentation and Recognition Through Exhaustive Scans or Learned Saccadic Jumps
Gale Martin
,
Mosfeq Rashid
,
J. Pittman
International journal of pattern recognition and…
1993
Corpus ID: 30414968
This paper advances two approaches to integrating handwritten character segmentation and recognition within one system, where the…
Expand
Highly Cited
1982
Highly Cited
1982
Analysis of Surface Flaw in Pressure Vessels by a New 3-Dimensional Alternating Method
T. Nishioka
,
S. Atluri
1982
Corpus ID: 3691793
An alternating method, in conjunction with the finite element method and a newly developed analytical solution for an elliptical…
Expand
Highly Cited
1967
Highly Cited
1967
Mechanical properties of selected glasscrystal composites
W. Frey
,
J. MacKenzie
1967
Corpus ID: 136595131
Desirable physical properties not provided by single-phase materials are often conveniently attained by multiphase composites…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE