Skip to search formSkip to main contentSkip to account menu

Vulnerability (computing)

Known as: Security hole, Vuln, Software vulnerabilities 
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Trust models have been recently suggested as an effective security mechanism for Wireless Sensor Networks (WSNs).Considerable… 
Review
2015
Review
2015
The rapid development of smartphone technologies have resulted in the evolution of mobile botnets. The implications of botnets… 
Review
2010
Review
2010
To help increase the confidence that software is secure, researchers and vendors have developed different kinds of automated… 
2009
2009
Botnets represent a serious security threat on the Inter- net. Current security mechanism are typically inadequate for protecting… 
2008
2008
This paper describes the design of a test suite for thorough evaluation of web application scanners. Web application scanners are… 
2007
2007
This paper discusses cross-sector infrastructure interdependencies and key risk considerations, analysis approaches, research and… 
2007
2007
Any given piece of software has some number of publicly disclosed vulnerabilities at any moment, leaving the system exposed to… 
2005
2005
  • G. Fu
  • 2005
  • Corpus ID: 107933961
Testing steel corrosion in reinforced concrete Alkali-silica reaction (ASR) testing of corrosion in concrete Acoustic testing of… 
Review
2001
Review
2001
Remotely sensed imagery data from satellites and airborne platforms have become important tools to assess vulnerability of urban…