Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,841,287 papers from all fields of science
Search
Sign In
Create Free Account
LibreSSL
LibreSSL is an open-source implementation of the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. It was forked from the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
"Classic" Mac OS
Address space layout randomization
Application-Layer Protocol Negotiation
Assembly language
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
VAWS: Vulnerability Analysis of Neural Networks using Weight Sensitivity
Muluken Hailesellasie
,
Jacob Nelson
,
Faiq Khalid
,
S. R. Hasan
Midwest Symposium on Circuits and Systems
2019
Corpus ID: 207758907
The advancement in deep learning has taken the technology world by storm in the last decade. Although, there is enormous progress…
Expand
2017
2017
Finding Security Vulnerabilities in Network Protocols Using Methods of Formal Verification
Adi Sosnovich
2017
Corpus ID: 254410491
1 Abbreviations and Notations 3
2013
2013
ProtoGENI, a Prototype GENI Under Security Vulnerabilities: An Experiment-Based Security Study
Dawei Li
,
X. Hong
,
Darwin Witt
IEEE Systems Journal
2013
Corpus ID: 17603805
ProtoGENI is one of the prototype implementations of global environment for network innovations (GENI). ProtoGENI proposes and…
Expand
2013
2013
E-Learning Software Security: Tested for Security Vulnerabilities & Issues
G. Violettas
,
T. Theodorou
,
G. Stephanides
Fourth International Conference on e-Learning…
2013
Corpus ID: 45169281
This paper intends to shed light on the security problems faced by e-learning software, which, until now has not been…
Expand
2011
2011
Security Vulnerabilities Detection Using Model Inference for Applications and Security Protocols
Karim Hossen
,
Roland Groz
,
J. Richier
IEEE Fourth International Conference on Software…
2011
Corpus ID: 15240522
"Internet of Services" (IoS) is a vision of the Internet of the Future where applications are built by combining services…
Expand
2010
2010
Enhanced Vulnerability Ontology for Information Risk Assessment and Dependability Management
M. Aime
,
Fabio Guasconi
Third International Conference on Dependability
2010
Corpus ID: 44879200
Security vulnerabilities play an increasing role within dependability procedures for information systems. However, traditional…
Expand
2007
2007
On the design of more secure software-intensive systems by use of attack patterns
M. Gegick
,
L. Williams
Information and Software Technology
2007
Corpus ID: 182815
2007
2007
Model-Based Security Vulnerability Testing
Percy Antonio Pari Salas
,
P. Krishnan
,
K. Ross
Australian Software Engineering Conference
2007
Corpus ID: 16125055
In this work we present a model-based framework for security vulnerabilities testing. Security vulnerabilities are not only…
Expand
2006
2006
OSPF Security Vulnerabilities Analysis
Emanuele Jones
,
O. L. Moigne
2006
Corpus ID: 114068711
Internet infrastructure protocols were designed at the very early stages of computer networks when "cyberspace" was still…
Expand
2005
2005
National Vulnerability Database: Helping Information Technology System Users and Developers Find Current Information about Cyber Security Vulnerabilities | NIST
S. Radack
2005
Corpus ID: 134039869
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE