Sciweavers

1101 search results - page 17 / 221
» On the Security and Vulnerability of PING
Sort
View
IEPOL
2010
107views more  IEPOL 2010»
14 years 8 months ago
Competition and patching of security vulnerabilities: An empirical analysis
Ashish Arora, Chris Forman, Anand Nandkumar, Rahul...
IEEESP
2010
92views more  IEEESP 2010»
14 years 7 months ago
Ethics in Security Vulnerability Research
Andrea M. Matwyshyn, Ang Cui, Angelos D. Keromytis...
AAAI
2008
14 years 12 months ago
Reinforcement Learning for Vulnerability Assessment in Peer-to-Peer Networks
Proactive assessment of computer-network vulnerability to unknown future attacks is an important but unsolved computer security problem where AI techniques have significant impact...
Scott Dejmal, Alan Fern, Thinh Nguyen
CCS
2007
ACM
15 years 3 months ago
Improving vulnerability discovery models
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Andy Ozment
IEEEARES
2009
IEEE
15 years 4 months ago
Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones
Near Field Communication (NFC)-enabled mobile phones and services are starting to appear in the field, yet no attempt was made to analyze the security of NFC-enabled mobile phone...
Collin Mulliner