Skip to search formSkip to main contentSkip to account menu

Vulnerability (computing)

Known as: Security hole, Vuln, Software vulnerabilities 
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Review
2008
Review
2008
Commercial aviation is at the threshold of the era of the e-enabled airplane, brought about by the convergence of rapidly… 
2007
2007
This paper discusses cross-sector infrastructure interdependencies and key risk considerations, analysis approaches, research and… 
2005
2005
  • G. Fu
  • 2005
  • Corpus ID: 107933961
Testing steel corrosion in reinforced concrete Alkali-silica reaction (ASR) testing of corrosion in concrete Acoustic testing of… 
Highly Cited
2004
Highly Cited
2004
IEEE 802.11 wireless networks have gained increasing popularity in recent times, providing users with both mobility and… 
Highly Cited
2001
Highly Cited
2001
Wireless communications are advancing rapidly. We are currently on the verge of a new revolutionary advancement in wireless data… 
Highly Cited
1998
Highly Cited
1998
The authors describe a system whose purpose is to explore the use of certificates for the distributed management of access rights… 
Highly Cited
1997
Highly Cited
1997
This paper describes the basic principles of designing and administering a relatively secure network. The principles are…