Vulnerability (computing)

Known as: Security hole, Vuln, Software vulnerabilities 
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Many security and software testing applications require checking whether certain properties of a program hold for any possible… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Review
2017
Review
2017
With the integration of advanced computing and communication technologies, smart grid is considered as the next-generation power… (More)
  • table I
  • figure 1
  • figure 2
  • figure 3
  • table II
Is this relevant?
Review
2017
Review
2017
More than a dozen wireless technologies are used by air traffic communication systems during different flight phases. From a… (More)
  • figure 1
  • table I
  • table II
  • figure 2
  • figure 3
Is this relevant?
Review
2017
Review
2017
Third-party library reuse has become common practice in contemporary software development, as it includes several benefits for… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
Review
2016
Review
2016
While researchers have developed many tools, techniques, and protocols for improving software security, exploits and breaches are… (More)
Is this relevant?
Highly Cited
2013
Highly Cited
2013
The rise of the Cloud Computing paradigm has led to security concerns, taking into account that resources are shared and mediated… (More)
  • figure 2
  • figure 1
  • table 1
  • table 3
  • table 2
Is this relevant?
Highly Cited
2012
Highly Cited
2012
An enormous number of apps have been developed for Android in recent years, making it one of the most popular mobile operating… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2011
Highly Cited
2011
The current discourse about cloud computing security issues makes a well-founded assessment of cloud computing's security impact… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
The concept of resilience has evolved considerably since Holling’s (1973) seminal paper. Different interpretations of what is… (More)
  • figure 1
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Despite numerous security technologies crafted to resist buffer overflow vulnerabilities, buffer overflows continue to be the… (More)
  • figure 2
  • figure 1
  • figure 4
  • figure 5
  • figure 6
Is this relevant?