Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,291 papers from all fields of science
Search
Sign In
Create Free Account
Open Vulnerability and Assessment Language
Known as:
OVAL
, Oval (disambiguation)
Open Vulnerability and Assessment Language (OVAL) is an international, information security, community standard to promote open and publicly…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Common Vulnerabilities and Exposures
Provisioning
Security Content Automation Protocol
XML
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Towards Unified Vulnerability Assessment with Open Data
Akihito Nakamura
IEEE 37th Annual Computer Software and…
2013
Corpus ID: 11276642
Continuous and comprehensive vulnerability management is a difficult task for administrators. The difficulties are not because of…
Expand
2013
2013
Avoiding inconsistencies in the Security Content Automation Protocol
W. Fitzgerald
,
S. Foley
IEEE Conference on Communications and Network…
2013
Corpus ID: 12418900
The Security Content Automation Protocol (SCAP) provides a standardized approach to specifying system configuration…
Expand
2012
2012
Towards the assessment of distributed vulnerabilities in autonomic networks and systems
Martín Barrère
,
Rémi Badonnel
,
O. Festor
IEEE Network Operations and Management Symposium
2012
Corpus ID: 108256
Vulnerability management constitutes a crucial activity within autonomic networks and systems. Distributed vulnerabilities must…
Expand
2011
2011
Supporting vulnerability awareness in autonomic networks and systems with OVAL
Martín Barrère
,
Rémi Badonnel
,
O. Festor
7th International Conference on Network and…
2011
Corpus ID: 10597046
Changes that are operated by autonomic networks and systems may generate vulnerabilities and increase the exposure to security…
Expand
2008
2008
Vulnerability Modelling for the Analysis of Network Attacks
P. Maggi
,
D. Pozza
,
R. Sisto
Third International Conference on Dependability…
2008
Corpus ID: 7870177
In order to perform a successful attack on a network, an intruder must know various penetration techniques, also known as…
Expand
2007
2007
On the Burnt Radius Teaching from the New Course Idea
Yu Bing-tu
2007
Corpus ID: 63869406
With the aim of 'primitively develop students',the new high school mathematics course standard requires students to change their…
Expand
2006
2006
On regular semiovals in PG(2,q)
A. Gács
2006
Corpus ID: 27528121
In this paper we prove that a point set in PG(2,q) meeting every line in 0, 1 or r points and having a unique tangent at each of…
Expand
2006
2006
Defecto septal atrial. Estudio morfopatológico, embriológico
L. Castellanos
,
M. K. Nivon
,
N. E. Zavaleta
,
H. Catalina
,
S. Sánchez
2006
Corpus ID: 58247866
SummaryA TRIAL SEPTAL DEFECT . A MORPHOPATHOLOGICALAND EMBRYOLOGICAL STUDY To contribute to a better understanding of…
Expand
1996
1996
A flexible presentation model for distributed information systems
T. Kirste
1996
Corpus ID: 15153169
One of the visions of mobile computing is to put “all information at the user’s fingertips” — to allow him to operate on any data…
Expand
1964
1964
PARAMETRIC EXPANSIONS FOR OVAL REINFORCING RINGS
W. P. Vafakos
,
N. Nissel
1964
Corpus ID: 118984651
Abstract : In the analysis of ring-reinforced oval cylinders it is convenient to choose for the local curvature of the oval…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE