Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,332,754 papers from all fields of science
Search
Sign In
Create Free Account
Vulnerability (computing)
Known as:
Security hole
, Vuln
, Software vulnerabilities
Expand
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Android
Application security
Arbitrary code execution
Attack patterns
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
An Efficient Distributed Trust Model for Wireless Sensor Networks
M. Salem
2016
Corpus ID: 52210455
Trust models have been recently suggested as an effective security mechanism for Wireless Sensor Networks (WSNs).Considerable…
Expand
Review
2015
Review
2015
Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues
Ahmad Karim
,
Syed Adeel Ali Shah
,
R. Salleh
,
Muhammad Arif
,
R. M. Noor
,
Shahaboddin Shamshirband
KSII Transactions on Internet and Information…
2015
Corpus ID: 18366581
The rapid development of smartphone technologies have resulted in the evolution of mobile botnets. The implications of botnets…
Expand
Review
2010
Review
2010
Visual analysis of code security
John R. Goodall
,
Hassan Radwan
,
Lenny Halseth
Visualization for Computer Security
2010
Corpus ID: 6494126
To help increase the confidence that software is secure, researchers and vendors have developed different kinds of automated…
Expand
2009
2009
Consequences of Botnets Spreading to Mobile Devices
A. Flø
,
A. Jøsang
2009
Corpus ID: 73602604
Botnets represent a serious security threat on the Inter- net. Current security mechanism are typically inadequate for protecting…
Expand
2008
2008
Building a Test Suite for Web Application Scanners
E. Fong
,
R. Gaucher
,
Vadim Okun
,
P. Black
,
Eric Dalci
Proceedings of the 41st Annual Hawaii…
2008
Corpus ID: 26438681
This paper describes the design of a test suite for thorough evaluation of web application scanners. Web application scanners are…
Expand
2007
2007
Analyzing Cross-Sector Interdependencies
J. Peerenboom
,
R. Fisher
Hawaii International Conference on System…
2007
Corpus ID: 163939
This paper discusses cross-sector infrastructure interdependencies and key risk considerations, analysis approaches, research and…
Expand
2007
2007
Estimating Software Vulnerabilities
Jeffrey R. Jones
IEEE Security and Privacy
2007
Corpus ID: 31541739
Any given piece of software has some number of publicly disclosed vulnerabilities at any moment, leaving the system exposed to…
Expand
2005
2005
Inspection and monitoring techniques for bridges and civil structures
G. Fu
2005
Corpus ID: 107933961
Testing steel corrosion in reinforced concrete Alkali-silica reaction (ASR) testing of corrosion in concrete Acoustic testing of…
Expand
Review
2001
Review
2001
Applications of remote sensing and GIS for damage assessment
F. Yamazaki
2001
Corpus ID: 53624860
Remotely sensed imagery data from satellites and airborne platforms have become important tools to assess vulnerability of urban…
Expand
1993
1993
Hunger, famine and the space of vulnerability
M. Watts
,
H. Bohle
1993
Corpus ID: 189882427
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE