Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,110,202 papers from all fields of science
Search
Sign In
Create Free Account
Vulnerability database
A vulnerability database is a platform aimed at collecting, maintaining, and disseminating information about discovered vulnerabilities targeting…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
1 relation
Cracking of wireless networks
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Vulnerability of groundwater to pollution using three different models inHalabja Saidsadiq basin, Iraq
Twana O. Abdullah
,
Salahalddin S. Ali
,
N. Al‐Ansari
,
S. Knutsson
2017
Corpus ID: 34008543
Halabja Saidsadiq Basin (HSB) is one of a major basin of Iraq in terms of groundwater reservoirs. Intensive agricultural…
Expand
2015
2015
Design and Implementation of Android Vulnerability Database
Yang Gan
2015
Corpus ID: 167266996
With the continuous development of mobile Internet, the security problem of mobile terminal equipment is more and more worthy of…
Expand
2015
2015
Vulnerability analysis related to extraordinary events in power systems
G. Kjølle
,
O. Gjerde
IEEE Eindhoven PowerTech
2015
Corpus ID: 31511196
A novel approach is developed for analyzing power system vulnerability related to extraordinary events. Vulnerability analyses…
Expand
2011
2011
Optimal placement of FACTS devices based on network security
Jafar Jafarzadeh
,
Mehrdad Trafdar Haq
,
S. M. Mahaei
,
P. Farhadi
International Conference on Computer Research and…
2011
Corpus ID: 3175677
In this paper, an objective function consisting of generators, bus bars and lines vulnerability indices for optimal placement of…
Expand
2011
2011
Reversing Microsoft patches to reveal vulnerable code
Harsimran Walia
2011
Corpus ID: 15756521
The paper would try to reveal the vulnerable code for a particular disclosed vulnerability, which is the first and foremost step…
Expand
2008
2008
Vulnerability assessment and control of large scale interconnected power systems using neural networks and neuro-fuzzy techniques
A. Haidar
,
A. Mohamed
,
M. Al-Dabbagh
,
A. Hussain
Australasian Universities Power Engineering…
2008
Corpus ID: 226271
Vulnerability Assessment and control are some of the essential requirements for maintaining security of modern power systems…
Expand
2007
2007
On the design of more secure software-intensive systems by use of attack patterns
M. Gegick
,
L. Williams
Information and Software Technology
2007
Corpus ID: 182815
Review
2006
Review
2006
Survey and Evaluation on Computer Vulnerability Database
Zhang Yong
2006
Corpus ID: 64196839
Computer vulnerability database has been an important part of vulnerability research, and it is greatly significant for…
Expand
2005
2005
Estimation of flood vulnerability index for delta areas through RS and GIS
B. S. P. Rao
,
K. Murty
,
E. Amminedu
Proceedings. IEEE International Geoscience and…
2005
Corpus ID: 10729184
Mitigation of floods is an important component of sustainable development. The east coast of India is more prone to cyclones…
Expand
2004
2004
Leading Indicators of Asian Currency crisis-the Weighted Signal Approach
Han-Min Hsing
2004
Corpus ID: 141065391
The purpose of this study is to examine both the general and country-specific leading indicators of 1997 currency crisis for…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE