Skip to search formSkip to main contentSkip to account menu

National Vulnerability Database

Known as: NVD 
The National Vulnerability Database is the U.S. government repository of standards-based vulnerability management data represented using the Security… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Performing risk assessment of computer networks is inevitable when doing network hardening. To have efficient attack prevention… 
2014
2014
Conventional multi-view displays spatially interlace various views of a 3D scene and form appropriate viewing channels. However… 
2013
2013
  • Akihito Nakamura
  • 2013
  • Corpus ID: 11276642
Continuous and comprehensive vulnerability management is a difficult task for administrators. The difficulties are not because of… 
2011
2011
Multiple Input Double Output (MIDO) asymmetric space-time codes for 4 transmit antennas and 2 receive antennas can be employed in… 
2011
2011
Due to the universality and importance of range search queries processing in mobile and spatial databases as well as in… 
2009
2009
Existing work on k nearest neighbor (k NN) in spatial/mobile query processing focuses on single object types. Furthermore, they… 
2005
2005
An explicit and systematic construction of space-time codes for arbitrary number of transmit antennas that achieve the diversity… 
2005
2005
In the recent landmark paper of Zheng and Tse it is shown for the quasi-static, Rayleigh-fading MIMO channel with nt transmit and… 
1998
1998
A new, efficient, adaptive very-high-resolution (AVHR) scheme based on the normalized variable and space formulation methodology… 
Highly Cited
1995
Highly Cited
1995
Metal nitrides - boron nitride, aluminium nitride, silicon nitride, transition metal nitrides metal carbides - silicon carbide…