Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

LibreSSL

LibreSSL is an open-source implementation of the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. It was forked from the… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Security vulnerabilities and defects are results of poorly constructed software that can lead to easy exploitation by the cyber… Expand
Is this relevant?
Highly Cited
2015
Highly Cited
2015
Autonomous vehicles capable of navigating unpredictable real-world environments with little human feedback are a reality today… Expand
Is this relevant?
2013
2013
As usage of cloud computing increases, customers are mainly concerned about choosing cloud infrastructure with sufficient… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
This paper describes the architecture and implementation of the Tahoma Web browsing system. Key to Tahoma is the browser… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2006
2006
Internet infrastructure protocols were designed at the very early stages of computer networks when "cyberspace" was still… Expand
Is this relevant?
Highly Cited
2005
Highly Cited
2005
This paper proposes a static analysis technique for detecting many recently discovered application vulnerabilities such as SQL… Expand
  • figure 1
  • figure 2
  • figure 5
  • figure 7
  • figure 8
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Security vulnerabilities related to buffer overruns account for the largest share of CERT advisories, as well as high-profile… Expand
Is this relevant?
2004
2004
Syntax-based vulnerability testing is a static black-box testing method for protocol implementations. It involves testing the… Expand
  • table 2
  • table 1
  • figure 1
  • figure 2
  • table 3
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Security vulnerabilities are discovered, become publicly known, get exploited by attackers, and patches come out. When should one… Expand
  • figure 1
  • table 2
  • figure 5
  • figure 7
  • table 4
Is this relevant?