Results 271 to 280 of about 489,634 (291)
Some of the next articles are maybe not open access.

From Analyzing Operating System Vulnerabilities to Designing Multiversion Intrusion-Tolerant Architectures

IEEE Transactions on Reliability, 2020
Anatoliy V Gorbenko   +2 more
exaly  

Mining trends and patterns of software vulnerabilities

Journal of Systems and Software, 2016
Wael Khreich
exaly  

Time series modeling of vulnerabilities

Computers and Security, 2015
Joseph K Nwankpa
exaly  

HYPOTHERMIA AND VULNERABILITY

Annals of the New York Academy of Sciences, 1959
openaire   +2 more sources

Shared Vulnerabilities

Pediatric Critical Care Medicine, 2023
openaire   +3 more sources

Taxonomies of attacks and vulnerabilities in computer systems

IEEE Communications Surveys and Tutorials, 2008
exaly  

Investigating the Causal Relationships between Causes of and Vulnerabilities to Corruption in the Chinese Public Construction Sector

Journal of Construction Engineering and Management - ASCE, 2014
Yun Le, Ming Shan, Albert P Chan
exaly  

Home - About - Disclaimer - Privacy