Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Vulnerability (computing)

Known as: Security hole, Vuln, Software vulnerabilities 
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2020
Review
2020
This retrospective paper describes the RowHammer problem in dynamic random access memory (DRAM), which was initially introduced… Expand
  • figure 1
  • figure 2
  • table I
Review
2020
Review
2020
Software-Defined Network (SDN) radically changes the network architecture by decoupling the network logic from the underlying… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Review
2019
Review
2019
Internet of Things (IoT) is reshaping the incumbent industry to smart industry featured with data-driven decision-making. However… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Review
2019
Review
2019
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted significant attention from the research… Expand
  • table I
  • figure 1
  • figure 2
  • table II
  • figure 3
Review
2019
Review
2019
The third generation partnership project released its first 5G security specifications in March 2018. This paper reviews the… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Review
2018
Review
2018
One of the goals of smart environments is to improve the quality of human life in terms of comfort and efficiency. The Internet… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Review
2018
Review
2018
For many, this is no longer a valid question and the case is considered settled with software defined networking/network function… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Review
2018
Review
2018
Fuzz testing has enjoyed great success at discovering security critical bugs in real software. Recently, researchers have devoted… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Review
2017
Review
2017
How climate change adaptation practices can constrain development and deliver maladaptive outcomes in vulnerability hotspots is… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Highly Cited
2011
Highly Cited
2011
The current discourse about cloud computing security issues makes a well-founded assessment of cloud computing's security impact… Expand
  • figure 1
  • figure 2