Skip to search formSkip to main contentSkip to account menu

Vulnerability (computing)

Known as: Security hole, Vuln, Software vulnerabilities 
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Highly Cited
2006
Highly Cited
2006
A firewall is a system acting as an interface of a network to one or more external networks. It implements the security policy of… 
Review
2006
Review
2006
Without physical boundaries, a wireless network faces many more vulnerabilities than a wired network does. IEEE 802.16 provides a… 
Highly Cited
2006
Highly Cited
2006
The pervasive interconnection of systems throughout the world has given computer services a significant socioeconomic value that… 
Highly Cited
2004
Highly Cited
2004
As the proliferation of Internet, mobile agent related technologies are examined for possible growth and evaluation. In… 
Highly Cited
2003
Highly Cited
2003
Mobile ad hoc networks have inherently different properties than traditional wired networks. These new characteristics present… 
Highly Cited
2001
Highly Cited
2001
Lightweight protocols for remote service invocation via HTTP and XML, such as SOAP, are rapidly gaining acceptance among… 
Highly Cited
2001
Highly Cited
2001
Wireless communications are advancing rapidly. We are currently on the verge of a new revolutionary advancement in wireless data… 
Highly Cited
1998
Highly Cited
1998
The authors describe a system whose purpose is to explore the use of certificates for the distributed management of access rights… 
Highly Cited
1978
Highly Cited
1978
Most of the published work on massive redundancy makes one crucial assumption: the redundant modules are synchronized. There are…