Results 261 to 270 of about 19,943 (307)
Some of the next articles are maybe not open access.

Assessing computer security vulnerability

ACM SIGOPS Operating Systems Review, 1995
The lack of a standard gauge for quantifying computer system vulnerability is a hindrance to communicating information about vulnerabilities, and is thus a hindrance to reducing those vulnerabilities. The inability to address this issue through uniform semantics often leads to uncoordinated efforts at combating exposure to common avenues ...
Salvador Barbosa, Jim Alves-Foss
openaire   +2 more sources

Computer vulnerabilities

Communications of the ACM, 1995
The online Risks Forum has long been a hotbed for discussions of the relative merits of openness relating to the dissemination of knowledge about security vulnerabilities. The debate has now been rekindled, and is summarized here.
openaire   +2 more sources

The Rising Tide Of Computational Vulnerability

Delicate Balance: Technics, Culture and Consequences, 1989
Computer evolution brings ever greater benefits, and ever greater danger as well. Emerging are the worm, virus, and otherwise surreptitious softwares. They billiantly expose the current ethics of computer use to intense public scrutiny. They are (obliquely) t he object of research in Artificial Life studies, for they possess some of the attributes of ...
openaire   +2 more sources

Societal vulnerability to computer system failures

Computers & Security, 1986
The world has become more dependent on computers which are active elements in bigger systems on which human lives depend - such as critical care units in hospitals, defense systems or air traffic control systems. Hence, the need to assure correct, reliable and safe operation has become more critical. With this need has come an increase in the attention
Lucy M. Moran, Lance J. Hoffman
openaire   +2 more sources

Vulnerabilities and storage security in cloud computing

2015 International Conference on Cloud Technologies and Applications (CloudTech), 2015
Nowadays, Cloud computing is a major trend. It is a new data hosting technology that becomes very popular lately thanks to the amortization of costs induced to companies. Since this concept is still in its first stages, new security risks start to appear. This paper will set forth the major security issues in cloud computing and propound a new solution
Amina Mimouni   +2 more
openaire   +2 more sources

Scheduler Vulnerabilities and Coordinated Attacks in Cloud Computing [PDF]

open access: possible2011 IEEE 10th International Symposium on Network Computing and Applications, 2011
In hardware virtualization a hypervisor provides multiple Virtual Machines (VMs) on a single physical system, each executing a separate operating system instance. The hypervisor schedules execution of these VMs much as the scheduler in an operating system does, balancing factors such as fairness and I/O performance.
Ravi Sundaram   +3 more
openaire   +2 more sources

Computer abuse perpetrators and vulnerabilities of computer systems

Proceedings of the June 7-10, 1976, national computer conference and exposition on - AFIPS '76, 1976
Analysis of computer abuse experience is valuable in threat and risk studies performed to develop appropriate safeguards in computer use. A profile of computer abuse perpetrators has been developed on the basis of interviews with 17 offenders involved in a total of 15 cases.
openaire   +3 more sources

The Vulnerable Plaque: Recent Advances in Computed Tomography Imaging to Identify the Vulnerable Patient

Current Atherosclerosis Reports, 2020
This review aims to summarize the role of coronary computed tomography plaque analysis in identifying high-risk patients and plaques.In this review, we will describe the histopathological features of a vulnerable plaque as well as the coronary computed tomography characteristics including spotty calcification, low-attenuation fatty core, positive ...
Faheemullah Beg   +2 more
openaire   +3 more sources

Exposing vulnerabilities of untrusted computing platforms

2012 IEEE 30th International Conference on Computer Design (ICCD), 2012
This work seeks to expose the vulnerability of un-trusted computing platforms used in critical systems to hardware Trojans and combined hardware/software attacks. As part of our entry in the Cyber Security Awareness Week (CSAW) Embedded System Challenge hosted by NYU-Poly in 2011, we developed and presented 10 such processor-level hardware Trojans ...
Yiorgos Makris   +2 more
openaire   +2 more sources

Research of Security Vulnerability in the Computer Network

2010 International Conference on Biomedical Engineering and Computer Science, 2010
In order to solve the problem of security vulnerability in the computer network radically, it was studied for the cause of vulnerability. Solving scheme was put forward aim at one kind of vulnerability, that is, by the special scan and encryption techniques, it makes attacker can't bypass its access control.
openaire   +2 more sources

Home - About - Disclaimer - Privacy