Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,160,421 papers from all fields of science
Search
Sign In
Create Free Account
Vulnerability (computing)
Known as:
Security hole
, Vuln
, Software vulnerabilities
Expand
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Android
Application security
Arbitrary code execution
Attack patterns
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Best practices for BYOD security
H. Romer
2014
Corpus ID: 62751276
Highly Cited
2006
Highly Cited
2006
Detection and Resolution of Anomalies in Firewall Policy Rules
M. Abedin
,
Syeda Nessa
,
L. Khan
,
B. Thuraisingham
Database Security
2006
Corpus ID: 15719925
A firewall is a system acting as an interface of a network to one or more external networks. It implements the security policy of…
Expand
Review
2006
Review
2006
Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions
Sen Xu
,
Chin-Tser Huang
International Symposium on Wireless Communication…
2006
Corpus ID: 12695083
Without physical boundaries, a wireless network faces many more vulnerabilities than a wired network does. IEEE 802.16 provides a…
Expand
Highly Cited
2006
Highly Cited
2006
Intrusion-tolerant middleware: the road to automatic security
P. Veríssimo
,
N. Neves
,
+5 authors
I. Welch
IEEE Security and Privacy
2006
Corpus ID: 864358
The pervasive interconnection of systems throughout the world has given computer services a significant socioeconomic value that…
Expand
Highly Cited
2004
Highly Cited
2004
A mobile agent security management
Eung-Gu You
,
Keum-Suk Lee
18th International Conference on Advanced…
2004
Corpus ID: 16590820
As the proliferation of Internet, mobile agent related technologies are examined for possible growth and evaluation. In…
Expand
Highly Cited
2003
Highly Cited
2003
Security Vulnerabilities in Ad Hoc Networks
P. Yau
,
C. Mitchell
2003
Corpus ID: 14084080
Mobile ad hoc networks have inherently different properties than traditional wired networks. These new characteristics present…
Expand
Highly Cited
2001
Highly Cited
2001
Fine grained access control for SOAP E-services
E. Damiani
,
S. Vimercati
,
S. Paraboschi
,
P. Samarati
The Web Conference
2001
Corpus ID: 5824418
Lightweight protocols for remote service invocation via HTTP and XML, such as SOAP, are rapidly gaining acceptance among…
Expand
Highly Cited
2001
Highly Cited
2001
A lightweight reconfigurable security mechanism for 3G/4G mobile devices
J. Al-Muhtadi
,
Dennis Mickunas
,
R. Campbell
IEEE wireless communications
2001
Corpus ID: 8640820
Wireless communications are advancing rapidly. We are currently on the verge of a new revolutionary advancement in wireless data…
Expand
Highly Cited
1998
Highly Cited
1998
Authorization and attribute certificates for widely distributed access control
W. Johnston
,
Srilekha Mudumbai
,
M. Thompson
Proceedings Seventh IEEE International Workshop…
1998
Corpus ID: 42065095
The authors describe a system whose purpose is to explore the use of certificates for the distributed management of access rights…
Expand
Highly Cited
1978
Highly Cited
1978
Synchronization and Matching in Redundant Systems
D. Davies
,
J. Wakerly
IEEE transactions on computers
1978
Corpus ID: 15222328
Most of the published work on massive redundancy makes one crucial assumption: the redundant modules are synchronized. There are…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE