Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,294,882 papers from all fields of science
Search
Sign In
Create Free Account
LibreSSL
LibreSSL is an open-source implementation of the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. It was forked from the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
"Classic" Mac OS
Address space layout randomization
Application-Layer Protocol Negotiation
Assembly language
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
VAWS: Vulnerability Analysis of Neural Networks using Weight Sensitivity
Muluken Hailesellasie
,
Jacob Nelson
,
Faiq Khalid
,
S. R. Hasan
Midwest Symposium on Circuits and Systems
2019
Corpus ID: 207758907
The advancement in deep learning has taken the technology world by storm in the last decade. Although, there is enormous progress…
Expand
2018
2018
An empirical study on automotive cyber attacks
Aman Singh
,
Madhusudan Singh
World Forum on Internet of Things
2018
Corpus ID: 13688060
There has been various technological advancements in the field of autonomous vehicles. Which increase the possibility of the…
Expand
2016
2016
A Formal Approach to Identifying Security Vulnerabilities in Telecommunication Networks
L. Laibinis
,
E. Troubitsyna
,
Inna Pereverzeva
,
Ian Oliver
,
S. Holtmanns
IEEE International Conference on Formal…
2016
Corpus ID: 13416085
The number of security attacks on the telecommunication networks is constantly increasing. To prevent them, the telecom sector is…
Expand
2013
2013
ProtoGENI, a Prototype GENI Under Security Vulnerabilities: An Experiment-Based Security Study
Dawei Li
,
X. Hong
,
Darwin Witt
IEEE Systems Journal
2013
Corpus ID: 17603805
ProtoGENI is one of the prototype implementations of global environment for network innovations (GENI). ProtoGENI proposes and…
Expand
2013
2013
E-Learning Software Security: Tested for Security Vulnerabilities & Issues
G. Violettas
,
T. Theodorou
,
G. Stephanides
Fourth International Conference on e-Learning…
2013
Corpus ID: 45169281
This paper intends to shed light on the security problems faced by e-learning software, which, until now has not been…
Expand
2010
2010
Enhanced Vulnerability Ontology for Information Risk Assessment and Dependability Management
M. Aime
,
Fabio Guasconi
Third International Conference on Dependability
2010
Corpus ID: 44879200
Security vulnerabilities play an increasing role within dependability procedures for information systems. However, traditional…
Expand
2009
2009
Un-Trusted-HB: Security Vulnerabilities of Trusted-HB
Dmitry Frumkin
,
A. Shamir
IACR Cryptology ePrint Archive
2009
Corpus ID: 12791591
With increased use of passive RFID tags, the need for secure lightweight identification protocols arose. HB+ is one such protocol…
Expand
2009
2009
RFID Technology, Security Vulnerabilities, and Countermeasures
Q. Xiao
,
T. Gibbons
,
Hervé Lebrun
2009
Corpus ID: 14701127
Radio frequency identification (RFID) is a means of automatic identification that uses radio waves to detect, track, identify…
Expand
2006
2006
OSPF Security Vulnerabilities Analysis
Emanuele Jones
,
O. L. Moigne
2006
Corpus ID: 114068711
Internet infrastructure protocols were designed at the very early stages of computer networks when "cyberspace" was still…
Expand
2004
2004
Syntax-based Vulnerability Testing of Frame-based Network Protocols
O. Tal
,
S. Knight
,
T. Dean
Conference on Privacy, Security and Trust
2004
Corpus ID: 17278892
Syntax-based vulnerability testing is a static black-box testing method for protocol implementations. It involves testing the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE