Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,758 papers from all fields of science
Search
Sign In
Create Free Account
Vulnerability database
A vulnerability database is a platform aimed at collecting, maintaining, and disseminating information about discovered vulnerabilities targeting…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
1 relation
Cracking of wireless networks
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Vulnerability of groundwater to pollution using three different models inHalabja Saidsadiq basin, Iraq
Twana O. Abdullah
,
Salahalddin S. Ali
,
N. Al‐Ansari
,
S. Knutsson
2017
Corpus ID: 34008543
Halabja Saidsadiq Basin (HSB) is one of a major basin of Iraq in terms of groundwater reservoirs. Intensive agricultural…
Expand
2015
2015
Design and Implementation of Android Vulnerability Database
Yang Gan
2015
Corpus ID: 167266996
With the continuous development of mobile Internet, the security problem of mobile terminal equipment is more and more worthy of…
Expand
2014
2014
The Vulnerability of Eti-Osa and Ibeju-Lekki Coastal Communities in Lagos State Nigeria to Climate Change Hazards
J. Omenai
,
D. Ayodele
2014
Corpus ID: 220622269
The rapid growth of population and infrastructure along the Lagos Coast present many challenges especially in the face of the…
Expand
2014
2014
Hurricane Katrina and the Forgotten Coast of Mississippi: Powering an Unequal Recovery
S. Cutter
,
C. Emrich
,
Jerry T. Mitchell
,
W. Piegorsch
,
Mark M. Smith
,
Lynn Weber
2014
Corpus ID: 108936605
1. The forgotten coast 2. Remembering the coast: the road to Camille 3. The second big one 4. Uneven recovery 5. Powering an…
Expand
2013
2013
Development of a spatially explicit vulnerability-resilience model for community level hazard mitigation enhancement
T. Frazier
,
Courtney M. Thompson
,
R. Dezzani
2013
Corpus ID: 129561816
Community vulnerability to coastal hazards can be difficult to analyze at a local level without proper modeling techniques…
Expand
2011
2011
Optimal placement of FACTS devices based on network security
Jafar Jafarzadeh
,
Mehrdad Trafdar Haq
,
S. M. Mahaei
,
P. Farhadi
International Conference on Computer Research and…
2011
Corpus ID: 3175677
In this paper, an objective function consisting of generators, bus bars and lines vulnerability indices for optimal placement of…
Expand
2008
2008
Vulnerability assessment and control of large scale interconnected power systems using neural networks and neuro-fuzzy techniques
A. Haidar
,
A. Mohamed
,
M. Al-Dabbagh
,
A. Hussain
Australasian Universities Power Engineering…
2008
Corpus ID: 226271
Vulnerability Assessment and control are some of the essential requirements for maintaining security of modern power systems…
Expand
2007
2007
On the design of more secure software-intensive systems by use of attack patterns
M. Gegick
,
L. Williams
Information and Software Technology
2007
Corpus ID: 182815
Review
2006
Review
2006
Survey and Evaluation on Computer Vulnerability Database
Zhang Yong
2006
Corpus ID: 64196839
Computer vulnerability database has been an important part of vulnerability research, and it is greatly significant for…
Expand
2004
2004
Leading Indicators of Asian Currency crisis-the Weighted Signal Approach
Han-Min Hsing
2004
Corpus ID: 141065391
The purpose of this study is to examine both the general and country-specific leading indicators of 1997 currency crisis for…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE