Skip to search formSkip to main contentSkip to account menu

Vulnerability management

Known as: Vulnerability mitigation 
Vulnerability management is the "cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities", especially in software… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
One of the most important effects induced by the over-exploitation of aquifers is the land subsidence. This dangerous situation… 
2011
2011
.................................................................................................................................. 3 Evolving Threats .................................................................................................................... 4 Easy Prey ............................................................................................................................. 4 Origin of Vulnerabilities .................................................................................................. 5 Cybercriminals Do Not Need 0-day Vulnerabilities ............................................... 6 Limitations of Traditional Defences............................................................................. 6 Protecting a Moving Target ................................................................................................ 8 Comparing Patching Strategies ..................................................................................... 9 Patch Availability ............................................................................................................. 12 Risk of Testing vs. Risk of Patching ............................................................................ 13 Cost of a Failed Patch.................................................................................................... 13 Compliance, Security, and Business Risks .................................................................... 15 Conclusion ............................................................................................................................ 16 
2011
2011
In this paper, we propose and analyze an analytical propagation model of a vulnerability mitigation worm (Seawave). The model… 
2011
2011
This paper briefly describes security challenges for critical web applications such as the Helios Voting system. After analyzing… 
2011
2011
NOVEMBER/DECEMBER 2011 1540-7993/11/$26.00 © 2011 IEEE COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES 67 Dan GuiDo… 
2010
2010
Current business-critical systems have stringent requirements for the significant and measurable increase in the end-to-end… 
2009
2009
Current business critical systems have stringent requirements for the significant and measurable increase in the end-to-end… 
2005
2005
The paper presents about the art of penetration testing. The reasons to have a penetration test are: it is a regulator… 
2005
2005
Disaster Risk and Vulnerability Management from Awareness to Practice.- Quantitative Area Risk Analysis: Available Tools and Open…