Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,951,203 papers from all fields of science
Search
Sign In
Create Free Account
SecurityFocus
Known as:
SecurityFocus.com
SecurityFocus is an online computer security news portal and purveyor of information security services. Home to the well-known Bugtraq mailing list…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Computer security
Cybercrime
Elias Levy
Matt's Script Archive
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Vulnerability database analysis for 10 years for ensuring security of cyber critical green infrastructures
Leake Zegeye
,
Mirko Sailio
IEEE Region 8 Conference AFRICON
2015
Corpus ID: 7033467
Checking the vulnerability and vulnerability history of green economy friendly critical infrastructures such as hydroelectric…
Expand
2011
2011
Fuzzing Testing Based on Environment
Huang Yu-han
2011
Corpus ID: 63676545
Considering the low coverage of test suites generated by traditional fuzzing testing techniques when used for detecting…
Expand
2007
2007
On the design of more secure software-intensive systems by use of attack patterns
M. Gegick
,
L. Williams
Information and Software Technology
2007
Corpus ID: 182815
2006
2006
Measuring Security Investment Benefit for COTS Based Systems-A Stakeholder Value Driven Approach
Yue Chen
,
B. Boehm
2006
Corpus ID: 6850811
This paper presents the Threat Modeling method based on Attacking Path Analysis (T-MAP) which quantifies security threats by…
Expand
2006
2006
An Empirical Analysis of Software Vendors' Patching Behavior: Impact of Vulnerability Disclosure
A. Arora
,
R. Krishnan
,
Rahul Telang
,
Yubao Yang
International Conference on Interaction Sciences
2006
Corpus ID: 15143745
One key aspect of better and more secure software is timely and reliable patching of vulnerabilities by software vendors…
Expand
2006
2006
A taste of APHRODITE : an Architecture for False Positive Reduction
Claudio Mazzariello
,
Francesco Oliviero
,
L. Peluso
,
S. Romano
,
Carlo Sansone
2006
Corpus ID: 18252966
This work addresses the problems of automated response systems in Wireless Mobile Ad Hoc Networks (MANETs), which is challenging…
Expand
2005
2005
Defining a Set of Common Benchmarks for Web Application Security
B. Livshits
2005
Corpus ID: 111117788
A recent explosion in the number of security vulnerabilities being discovered every day motivated a great deal of interest in…
Expand
2005
2005
Characteristic Classification and Correlation Analysis of Source-Level Vulnerabilities in the Linux Kernel
Kwangsun Ko
,
I. Jang
,
Yong-hyeog Kang
,
Jinseok Lee
,
Y. Eom
International Conference on Computational…
2005
Corpus ID: 44787245
Although studies regarding the classification and analysis of source-level vulnerabilities in operating systems are not direct…
Expand
2003
2003
National Cyber Defense : A Design for Securing our Future
Nathan April
2003
Corpus ID: 16420046
This paper represents the base design for a national cyber defense system upon which can be largely expanded to suit the needs of…
Expand
2003
2003
Defense in Depth for DNS
Cheng C. Teoh
2003
Corpus ID: 178722659
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE