Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,238,536 papers from all fields of science
Search
Sign In
Create Free Account
Open Source Vulnerability Database
Known as:
OSVDB
Open Sourced Vulnerability Database (OSVDB) was an independent and open-sourced database. The goal of the project was to provide accurate, detailed…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Database
Information security
Open security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching
Antonio Nappa
,
Richard B. Johnson
,
Leyla Bilge
,
Juan Caballero
,
Tudor Dumitras
IEEE Symposium on Security and Privacy
2015
Corpus ID: 15715668
Vulnerability exploits remain an important mechanism for malware delivery, despite efforts to speed up the creation of patches…
Expand
2015
2015
Application of quantitative security metrics in cloud computing
K. Torkura
,
Feng Cheng
,
C. Meinel
International Conference for Internet Technology…
2015
Corpus ID: 17895391
Security issues are still prevalent in cloud computing particularly public cloud. Efforts by Cloud Service Providers to secure…
Expand
2015
2015
An automatic method for CVSS score prediction using vulnerabilities description
Atefeh Khazaei
,
M. Ghasemzadeh
,
V. Derhami
Journal of Intelligent & Fuzzy Systems
2015
Corpus ID: 5647495
In this paper we introduce an objective method for CVSS score calculation. CVSS is a well known and mostly used method for giving…
Expand
2012
2012
Linking Cybersecurity Knowledge : Cybersecurity Information Discovery Mechanism
Takeshi Takahashi
,
Y. Kadobayashi
,
Yuuki Takano
2012
Corpus ID: 39099355
To cope with increasing amount of cyber threats, organizations need to share cybersecurity information beyond the borders of…
Expand
2011
2011
Benchmarking the Security of Web Serving Systems Based on Known Vulnerabilities
N. Mendes
,
J. Durães
,
H. Madeira
Latin-American Symposium on Dependable Computing
2011
Corpus ID: 2738114
This paper proposes a methodology and a tool to evaluate the security risk presented when using software components or systems…
Expand
Highly Cited
2006
Highly Cited
2006
Attack Graph Based Evaluation of Network Security
Igor Kotenko
,
M. Stepashkin
Communications and Multimedia Security
2006
Corpus ID: 11950231
The perspective directions in evaluating network security are simulating possible malefactor's actions, building the…
Expand
2006
2006
Network Security Evaluation Based on Simulation of Malfactor's Behavior
Igor Kotenko
,
M. Stepashkin
International Conference on Security and…
2006
Corpus ID: 4878261
The approach to computer network security analysis intended for using both at design and exploitation stages is suggested. This…
Expand
2006
2006
Software Vulnerability Analysis for Web Services Software Systems
Weider D. Yu
,
D. Aravind
,
Passarawarin Supthaweesuk
International Symposium on Computers and…
2006
Corpus ID: 7190897
The use of Web Services has begun to significantly impact organizations and companies. Major business oriented objectives in…
Expand
2005
2005
Trustworthy Web services based on testing
Weider D. Yu
,
Passarawarin Supthaweesuk
,
D. Aravind
International Symposium on Service Oriented…
2005
Corpus ID: 41185282
The Web services technology allows software components independently developed in disparate platforms to communicate in a…
Expand
2005
2005
Overcoming programming flaws: indexing of common software vulnerabilities
Kaloian Petkov
Annual Conference on Information Security…
2005
Corpus ID: 15876658
The goal of this research project was to identify categories of programming flaws that lead to software bugs and index existing…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE