Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Vulnerability (computing)

Known as: Security hole, Vuln, Software vulnerabilities 
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Abstract Cyber-physical systems (CPSs), which are an integration of computation, networking, and physical processes, play an… Expand
  • figure 1
Is this relevant?
Review
2017
Review
2017
Third-party library reuse has become common practice in contemporary software development, as it includes several benefits for… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
Review
2017
Review
2017
Internet of Things (IoT) is one of the most buzzing and discussed topic in research field today. Some of the researchers are also… Expand
  • figure 2
  • table I
Is this relevant?
Review
2017
Review
2017
Third-party libraries in Android apps have repeatedly been shown to be hazards to the users' privacy and an amplification of… Expand
  • table 1
  • figure 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
Review
2017
Review
2017
Software security vulnerabilities are one of the critical issues in the realm of computer security. Due to their potential high… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Review
2017
Review
2017
Since the early 1960, industrial process control has been applied by electric systems. In the mid 1970's, the term SCADA emerged… Expand
  • figure 1
  • table I
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2011
Highly Cited
2011
The current discourse about cloud computing security issues makes a well-founded assessment of cloud computing's security impact… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
The concept of resilience has evolved considerably since Holling’s (1973) seminal paper. Different interpretations of what is… Expand
  • figure 1
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2003
Highly Cited
2003
The convenience of 802.11-based wireless access networks has led to widespread deployment in the consumer, industrial and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1994
Highly Cited
1994
Many disasters are a complex mix of natural hazards and human action. At Risk argues that the social, political and economic… Expand
  • table 1.1
  • table 1.2
  • figure 1.1
  • table 1.3
  • figure 2.2
Is this relevant?