We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 8,812 results
  1. Vulnerability Assessment and Penetration Testing

    Vulnerability assessment is a comprehensive process aimed at identifying, quantifying, and prioritizing vulnerabilities within a system. This system...
    Dr. Jason Edwards in Mastering Cybersecurity
    Chapter 2024
  2. Detection of Intrusions and Malware, and Vulnerability Assessment 21st International Conference, DIMVA 2024, Lausanne, Switzerland, July 17–19, 2024, Proceedings

    This book constitutes the proceedings of the 21st International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment,...

    Federico Maggi, Manuel Egele, ... Michele Carminati in Lecture Notes in Computer Science
    Conference proceedings 2024
  3. Cyber-Attack Analysis Using Vulnerability Assessment and Penetration Testing

    Networks and systems like computers and mobile devices are not secure enough and are vulnerable to numerous types of cyber-threats. The frequency of...
    Vijayashree Budyal, A. V. Vaibhav, ... Gaonkar Unnathi in Cyber Security and Digital Forensics
    Conference paper 2024
  4. Vulnerability Assessment and Management for Coastal Erosion

    The significance of coastal regions for global sustainability cannot be overstated. Coastal conditions are constantly changing and working to...
    Khairul Nizam Abdul Maulud, Fazly Amri Mohd, ... Syed Ahmad Fadhli Syed Abdul Rahman in Advances in Geoinformatics Technologies
    Chapter 2024
  5. Detection of Intrusions and Malware, and Vulnerability Assessment 20th International Conference, DIMVA 2023, Hamburg, Germany, July 12–14, 2023, Proceedings

    This book constitutes the proceedings of the 20th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment,...
    Daniel Gruss, Federico Maggi, ... Michele Carminati in Lecture Notes in Computer Science
    Conference proceedings 2023
  6. Vulnerability Assessment Framework Based on In-The-Wild Exploitability for Prioritizing Patch Application in Control System

    With the increasing understanding of attackers towards the characteristics of control systems and the growing connectivity with information...
    Seong-Su Yoon, Do-Yeon Kim, ... Ieck-Chae Euom in Information Security Applications
    Conference paper 2024
  7. Dynamic vulnerability severity calculator for industrial control systems

    The convergence of information and communication technologies has introduced new and advanced capabilities to Industrial Control Systems. However,...

    Pavlos Cheimonidis, Konstantinos Rantos in International Journal of Information Security
    Article 08 May 2024
  8. Detection of Intrusions and Malware, and Vulnerability Assessment 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 –July 1, 2022, Proceedings

    This book constitutes the proceedings of the 19th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment,...
    Lorenzo Cavallaro, Daniel Gruss, ... Giorgio Giacinto in Lecture Notes in Computer Science
    Conference proceedings 2022
  9. A vehicle firmware security vulnerability: an IVI exploitation

    In the last years, the increasing vehicular technology has led to a surge in cybersecurity attacks, particularly regarding connected vehicles and...

    Gianpiero Costantino, Marco De Vincenzi, Ilaria Matteucci in Journal of Computer Virology and Hacking Techniques
    Article Open access 08 May 2024
  10. Comprehensive vulnerability aspect extraction

    Extracting valuable information from unstructured vulnerability reports constitutes a fundamental task in numerous cybersecurity applications....

    Qindong Li, Wenyi Tang, ... Lizhi Wang in Applied Intelligence
    Article 08 February 2024
  11. Tropical Cyclones and Coastal Vulnerability: Assessment and Mitigation

    Tropical cyclone (TC) landfalls are among the most damaging natural disasters. The North Indian Ocean (NIO) experiences ~12% of all cyclones every...
    Chapter 2022
  12. Resilience & Vulnerability: Concepts and Policy Contexts

    Climate change is an unparalleled global challenge, with profound implications for the environment, societies, and economies. As the Earth’s climate...
    Syed Shahid Mazhar, Farhina Sardar Khan, ... Ambrina Sardar Khan in Geospatial Technology to Support Communities and Policy
    Chapter 2024
  13. Vulnerability management in Linux distributions

    Vulnerabilities in software systems not only lead to loss of revenue, but also to loss of reputation and trust. To avoid this, software providers...

    Jiahuei Lin, Haoxiang Zhang, ... Ahmed E. Hassan in Empirical Software Engineering
    Article 16 February 2023
  14. Advancing Software Vulnerability Scoring: A Statistical Approach with Machine Learning Techniques and GridSearchCV Parameter Tuning

    The growing complexity, diversity, and importance of software pose a significant threat to computer system security due to exploitable software...

    Birendra Kumar Verma, Ajay Kumar Yadav in SN Computer Science
    Article 28 May 2024
  15. Generating ICS vulnerability playbooks with open standards

    Organizations face attacks on industrial control systems (ICS) as vulnerabilities are pervasive. However, patching vulnerable systems by simply...

    Philip Empl, Daniel Schlette, ... Günther Pernul in International Journal of Information Security
    Article Open access 11 December 2023
  16. ProRLearn: boosting prompt tuning-based vulnerability detection by reinforcement learning

    Software vulnerability detection is a critical step in ensuring system security and data protection. Recent research has demonstrated the...

    Zilong Ren, **aolin Ju, ... Hao Shen in Automated Software Engineering
    Article 20 April 2024
  17. Identifying the systemic importance and systemic vulnerability of financial institutions based on portfolio similarity correlation network

    The indirect correlation among financial institutions, stemming from similarities in their portfolios, is a primary driver of systemic risk. However,...

    Man** Shao, Hong Fan in EPJ Data Science
    Article Open access 31 January 2024
  18. Vulnerability Metrics

    Living reference work entry 2024
  19. A Security and Vulnerability Assessment on Android Gambling Applications

    Due to the pandemic, along with its lockdowns, a lot of entertainment places have temporarily or permanently closed down, like casinos. Since they...
    Eric Blancaflor, Robert Leyton-Pete J. Pastrana, ... Jairo Antonio M. Umali in Computer and Communication Engineering
    Conference paper 2023
  20. Assessing Vulnerability from Its Description

    This paper shows an end-to-end Artificial Intelligence (AI) system to estimate the severity level and the various Common Vulnerability Scoring System...
    Zi**g Zhang, Vimal Kumar, ... Albert Bifet in Ubiquitous Security
    Conference paper 2023
Did you find what you were looking for? Share feedback.