Sciweavers

1101 search results - page 15 / 221
» On the Security and Vulnerability of PING
Sort
View
USS
2010
14 years 7 months ago
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study
Wireless networks are being integrated into the modern automobile. The security and privacy implications of such in-car networks, however, are not well understood as their transmi...
Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis T...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 1 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
DSN
2009
IEEE
15 years 4 months ago
Using web security scanners to detect vulnerabilities in web services
Marco Vieira, Nuno Antunes, Henrique Madeira
HICSS
2006
IEEE
111views Biometrics» more  HICSS 2006»
15 years 3 months ago
Physical Security and Vulnerability Modeling for Infrastructure Facilities
Dean A. Jones, Chad E. Davis, Mark A. Turnquist, L...