Skip to search formSkip to main contentSkip to account menu

Vulnerability (computing)

Known as: Security hole, Vuln, Software vulnerabilities 
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Review
2006
Review
2006
Without physical boundaries, a wireless network faces many more vulnerabilities than a wired network does. IEEE 802.16 provides a… 
Highly Cited
2004
Highly Cited
2004
As the proliferation of Internet, mobile agent related technologies are examined for possible growth and evaluation. In… 
Highly Cited
2004
Highly Cited
2004
IEEE 802.11 wireless networks have gained increasing popularity in recent times, providing users with both mobility and… 
Highly Cited
2003
Highly Cited
2003
Mobile ad hoc networks have inherently different properties than traditional wired networks. These new characteristics present… 
Highly Cited
2001
Highly Cited
2001
Lightweight protocols for remote service invocation via HTTP and XML, such as SOAP, are rapidly gaining acceptance among… 
Highly Cited
2001
Highly Cited
2001
Wireless communications are advancing rapidly. We are currently on the verge of a new revolutionary advancement in wireless data… 
Highly Cited
1998
Highly Cited
1998
The authors describe a system whose purpose is to explore the use of certificates for the distributed management of access rights… 
Highly Cited
1997
Highly Cited
1997
This paper describes the basic principles of designing and administering a relatively secure network. The principles are…