Skip to search formSkip to main contentSkip to account menu

Vulnerability management

Known as: Vulnerability mitigation 
Vulnerability management is the "cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities", especially in software… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
One of the most important effects induced by the over-exploitation of aquifers is the land subsidence. This dangerous situation… 
2017
2017
Purpose The purpose of this paper is to investigate the vulnerability of projects implemented in enterprises. The paper… 
2011
2011
.................................................................................................................................. 3 Evolving Threats .................................................................................................................... 4 Easy Prey ............................................................................................................................. 4 Origin of Vulnerabilities .................................................................................................. 5 Cybercriminals Do Not Need 0-day Vulnerabilities ............................................... 6 Limitations of Traditional Defences............................................................................. 6 Protecting a Moving Target ................................................................................................ 8 Comparing Patching Strategies ..................................................................................... 9 Patch Availability ............................................................................................................. 12 Risk of Testing vs. Risk of Patching ............................................................................ 13 Cost of a Failed Patch.................................................................................................... 13 Compliance, Security, and Business Risks .................................................................... 15 Conclusion ............................................................................................................................ 16 
2011
2011
NOVEMBER/DECEMBER 2011 1540-7993/11/$26.00 © 2011 IEEE COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES 67 Dan GuiDo… 
2011
2011
This paper briefly describes security challenges for critical web applications such as the Helios Voting system. After analyzing… 
2011
2011
In this paper, we propose and analyze an analytical propagation model of a vulnerability mitigation worm (Seawave). The model… 
2010
2010
Current business-critical systems have stringent requirements for the significant and measurable increase in the end-to-end… 
2009
2009
Current business critical systems have stringent requirements for the significant and measurable increase in the end-to-end… 
2005
2005
The paper presents about the art of penetration testing. The reasons to have a penetration test are: it is a regulator…