Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 69 matches
- 2024
- Arash Negahdari Kia, Finbarr Murphy, Barry Sheehan, Darren Shannon:
A cyber risk prediction model using common vulnerabilities and exposures. Expert Syst. Appl. 237(Part B): 121599 (2024) - Raj Kumar B, Aruna Kranthi Godishala, Ravinder Reddy Malaga, Pradeep Kagitapu:
Securing web apps: Analysis to understand common vulnerabilities, attack scenarios, and protective measures. ICCDE 2024: 64-70 - Lyuye Zhang, Kaixuan Li, Kairan Sun, Daoyuan Wu, Ye Liu, Haoye Tian, Yang Liu:
ACFIX: Guiding LLMs with Mined Common RBAC Practices for Context-Aware Repair of Access Control Vulnerabilities in Smart Contracts. CoRR abs/2403.06838 (2024) - 2023
- Philipp Kühn, David N. Relke, Christian Reuter:
Common vulnerability scoring system prediction based on open source intelligence information sources. Comput. Secur. 131: 103286 (2023) - Peng Liu, Wenzhe Ye, Haiying Duan, Xianxian Li, Shuyi Zhang, Chuanjian Yao, Yongnan Li:
Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities. Cybersecur. 6(1): 29 (2023) - Yinghui Wang, Bin Yu, Haiyang Yu, Lingyun Xiao, Haojie Ji, Yanan Zhao:
Automotive Cybersecurity Vulnerability Assessment Using the Common Vulnerability Scoring System and Bayesian Network Model. IEEE Syst. J. 17(2): 2880-2891 (2023) - Natarajan Krishnaraj, Chirag Madaan, Sanjana Awasthi, Raggav Subramani, Harsh Avinash, Sankalp Mukim:
Common vulnerabilities in real world web applications. doors 2023: 9-22 - Oey Kevin Andrian Santoso, Catherine Kwee, William Chua, Ghinaa Zain Nabiilah, Rojali:
Rust's Memory Safety Model: An Evaluation of Its Effectiveness in Preventing Common Vulnerabilities. ICCSCI 2023: 119-127 - 2022
- Jaimandeep Singh, Naveen Kumar Chaudhary:
OAuth 2.0 : Architectural design augmentation for mitigation of common security vulnerabilities. J. Inf. Secur. Appl. 65: 103091 (2022) - Norman Santiago, Janelli Mendez:
Analysis of Common Vulnerabilities and Exposures to Produce Security Trends. CSW 2022: 16-19 - Ibifubara Iganibo, Massimiliano Albanese, Kaan Turkmen, Thomas R. Campbell, Marc Mosko:
Mason Vulnerability Scoring Framework: A Customizable Framework for Scoring Common Vulnerabilities and Weaknesses. SECRYPT 2022: 215-225 - Philipp Kuehn, David N. Relke, Christian Reuter:
Common Vulnerability Scoring System Prediction based on Open Source Intelligence Information Sources. CoRR abs/2210.02143 (2022) - 2021
- Nagesh Subbanna, Matthias Wilms, Anup Tuladhar, Nils D. Forkert:
An Analysis of the Vulnerability of Two Common Deep Learning-Based Medical Image Segmentation Techniques to Model Inversion Attacks. Sensors 21(11): 3874 (2021) - Giovanni George, Jeremiah Kotey, Megan Ripley, Kazi Zakia Sultana, Zadia Codabux:
A Preliminary Study on Common Programming Mistakes that Lead to Buffer Overflow Vulnerability. COMPSAC 2021: 1375-1380 - Tianyi Wang, Shengzhi Qin, Kam-Pui Chow:
Towards Vulnerability Types Classification Using Pure Self-Attention: A Common Weakness Enumeration Based Approach. CSE 2021: 146-153 - Alok Chandrakant Ratnaparkhi, Yi Liu:
Towards Tackling Common Web Application Vulnerabilities Using Secure Design Patterns. EIT 2021: 1-6 - Mera Saulaiman, Márta Takács, Miklos Kozlovszky, Ákos Csilling:
Fuzzy Model for Common Vulnerability Scoring System. SACI 2021: 419-424 - Masaki Aota, Tao Ban, Takeshi Takahashi, Noboru Murata:
Multi-label Positive and Unlabeled Learning and its Application to Common Vulnerabilities and Exposure Categorization. TrustCom 2021: 988-996 - Aleksandar Kircanski, Terence Tarvis:
Coinbugs: Enumerating Common Blockchain Implementation-Level Vulnerabilities. CoRR abs/2104.06540 (2021) - Maha Ali Allouzi, Javed I. Khan:
Identifying and Modeling Security Threats for IoMT Edge Network using Markov Chain and Common Vulnerability Scoring System (CVSS). CoRR abs/2104.11580 (2021) - Benjamin Ampel, Sagar Samtani, Steven Ullman, Hsinchun Chen:
Linking Common Vulnerabilities and Exposures to the MITRE ATT&CK Framework: A Self-Distillation Approach. CoRR abs/2108.01696 (2021) - Pattaraporn Sangaroonsilp, Hoa Khanh Dam, Aditya Ghose:
Common Privacy Weaknesses and Vulnerabilities in Software Applications. CoRR abs/2112.13997 (2021) - 2020
- Reza Ghasemi:
Resolving a common vulnerability in secret sharing scheme-based data outsourcing schemes. Concurr. Comput. Pract. Exp. 32(2) (2020) - Mieng Lim:
Avoiding the most common vulnerability-management pitfalls. Netw. Secur. 2020(7): 12-14 (2020) - Mudabbir Kaleem, Anastasia Mavridou, Aron Laszka:
Vyper: A Security Comparison with Solidity Based on Common Vulnerabilities. BRAINS 2020: 107-111 - Onyeka Ezenwoye, Yi Liu, William Patten:
Classifying Common Security Vulnerabilities by Software Type. SEKE 2020: 61-64 - Mudabbir Kaleem, Aron Laszka:
Vyper: A Security Comparison with Solidity Based on Common Vulnerabilities. CoRR abs/2003.07435 (2020) - 2019
- Andrzej Bialas:
Structurization of the Common Criteria Vulnerability Assessment Process. DepCoS-RELCOMEX 2019: 33-45 - Doudou Fall, Youki Kadobayashi:
The Common Vulnerability Scoring System vs. Rock Star Vulnerabilities: Why the Discrepancy? ICISSP 2019: 405-411 - Madeline Schiappa, Graham Chantry, Ivan Garibay:
Cyber Security in a Complex Community: A Social Media Analysis on Common Vulnerabilities and Exposures. SNAMS 2019: 13-20
skipping 39 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-23 23:10 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint