Sciweavers

1101 search results - page 16 / 221
» On the Security and Vulnerability of PING
Sort
View
IFIP
2001
Springer
15 years 2 months ago
Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks
Steven Furnell, Maria Papadaki, G. Magklaras, A. A...
HICSS
2010
IEEE
114views Biometrics» more  HICSS 2010»
14 years 11 months ago
Measuring Similarity for Security Vulnerabilities
Ju An Wang, Linfeng Zhou, Minzhe Guo, Hao Wang, Ja...
CORR
2010
Springer
52views Education» more  CORR 2010»
14 years 9 months ago
Vulnerability of MRD-Code-based Universal Secure Network Coding against Stronger Eavesdroppers
Eitaro Shioji, Ryutaroh Matsumoto, Tomohiko Uyemat...
COMPSEC
2007
66views more  COMPSEC 2007»
14 years 9 months ago
Measuring, analyzing and predicting security vulnerabilities in software systems
Omar H. Alhazmi, Yashwant K. Malaiya, Indrajit Ray