Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,639,109 papers from all fields of science
Search
Sign In
Create Free Account
Vulnerability (computing)
Known as:
Security hole
, Vuln
, Software vulnerabilities
Expand
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Android
Application security
Arbitrary code execution
Attack patterns
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Best practices for BYOD security
H. Romer
2014
Corpus ID: 62751276
Review
2008
Review
2008
Secure Operation, Control, and Maintenance of Future E-Enabled Airplanes
K. Sampigethaya
,
R. Poovendran
,
L. Bushnell
Proceedings of the IEEE
2008
Corpus ID: 207020231
Commercial aviation is at the threshold of the era of the e-enabled airplane, brought about by the convergence of rapidly…
Expand
Highly Cited
2008
Highly Cited
2008
A study on secure RFID mutual authentication scheme in pervasive computing environment
Sooyoung Kang
,
Deok-Gyu Lee
,
Imyeong Lee
Computer Communications
2008
Corpus ID: 2497889
2007
2007
Analyzing Cross-Sector Interdependencies
J. Peerenboom
,
R. Fisher
Hawaii International Conference on System…
2007
Corpus ID: 163939
This paper discusses cross-sector infrastructure interdependencies and key risk considerations, analysis approaches, research and…
Expand
2005
2005
Inspection and monitoring techniques for bridges and civil structures
G. Fu
2005
Corpus ID: 107933961
Testing steel corrosion in reinforced concrete Alkali-silica reaction (ASR) testing of corrosion in concrete Acoustic testing of…
Expand
Highly Cited
2004
Highly Cited
2004
IEEE 802.11 wireless LAN security performance using multiple clients
N. Baghaei
,
R. Hunt
ICON
2004
Corpus ID: 14642684
IEEE 802.11 wireless networks have gained increasing popularity in recent times, providing users with both mobility and…
Expand
Highly Cited
2001
Highly Cited
2001
A lightweight reconfigurable security mechanism for 3G/4G mobile devices
J. Al-Muhtadi
,
Dennis Mickunas
,
R. Campbell
IEEE wireless communications
2001
Corpus ID: 8640820
Wireless communications are advancing rapidly. We are currently on the verge of a new revolutionary advancement in wireless data…
Expand
Highly Cited
1998
Highly Cited
1998
Authorization and attribute certificates for widely distributed access control
W. Johnston
,
Srilekha Mudumbai
,
M. Thompson
Proceedings Seventh IEEE International Workshop…
1998
Corpus ID: 42065095
The authors describe a system whose purpose is to explore the use of certificates for the distributed management of access rights…
Expand
Highly Cited
1997
Highly Cited
1997
Security issues in networks with Internet access
C. Landwehr
,
D. Goldschlag
Proceedings of the IEEE
1997
Corpus ID: 16238377
This paper describes the basic principles of designing and administering a relatively secure network. The principles are…
Expand
Highly Cited
1991
Highly Cited
1991
Predator risk affects foraging behaviour of pikas: observational and experimental evidence
W. G. Holmes
Animal Behaviour
1991
Corpus ID: 53201572
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required