Results 221 to 230 of about 345,903 (245)
Some of the next articles are maybe not open access.
Vulnerability/Consequence Analysis
2020Secure, functioning, and resilient critical networks requires the efficient exchange of information, including intelligence, between all levels of government and critical infrastructure sector owners and operators. This must facilitate the timely exchange of threat and vulnerability information as well as information that allows for the development of ...
openaire +1 more source
Web applications vulnerabilities analysis
2016From the last twenty five years, the web has evolved into an important part of our lives. There are web applications for every kind of job and activity. In parallel, all this situation is very attractive for attackers who want to manipulate users’ data and other sensitive information.
openaire +1 more source

