Vulnerability management

Known as: Vulnerability mitigation 
Vulnerability management is the "cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities", especially in software… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
The Digital Revolution is inducing major threats to many types of human systems. We present the SVIDT method (a Strengths… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2015
2015
The paper describes a process for road network vuln erability analysis, from (i) the conceptual definition of vulnerability… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2015
2015
  • Tom Palmaers
  • 2015
This paper looks at how a vulnerability management (VM) process could be designed & implemented within an organization. Articles… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2010
Highly Cited
2010
In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments… (More)
  • figure 1
Is this relevant?
2009
2009
In order to reach the goals of the Information Security Automation Program (ISAP) [1], we propose an ontological approach to… (More)
  • figure 1
  • figure 4
  • figure 2
  • figure 5
  • figure 3
Is this relevant?
2009
2009
Vulnerabilities in operating systems and web applications have been and are being put into various classifications, leading to a… (More)
  • figure 1
  • table I
  • table II
  • figure 4
Is this relevant?
2008
2008
To secure a network, ideally, all software in the computers should be updated. However, especially in a server farm, we have to… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • table 3
Is this relevant?
2007
2007
As a software engineer or client, how much of your budget should you spend on software security mitigation for the applications… (More)
  • figure 1
  • figure 2
Is this relevant?
2005
2005
The Department of Defense’s new enterprise licenses for vulnerability assessment and remediation tools [1,2] call for use of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2004
2004
With the continuous flood of vulnerabilities of computers, vulnerability management is a very important task for administrators… (More)
Is this relevant?