Results 261 to 270 of about 19,943 (307)
Some of the next articles are maybe not open access.
Assessing computer security vulnerability
ACM SIGOPS Operating Systems Review, 1995The lack of a standard gauge for quantifying computer system vulnerability is a hindrance to communicating information about vulnerabilities, and is thus a hindrance to reducing those vulnerabilities. The inability to address this issue through uniform semantics often leads to uncoordinated efforts at combating exposure to common avenues ...
Salvador Barbosa, Jim Alves-Foss
openaire +2 more sources
Communications of the ACM, 1995
The online Risks Forum has long been a hotbed for discussions of the relative merits of openness relating to the dissemination of knowledge about security vulnerabilities. The debate has now been rekindled, and is summarized here.
openaire +2 more sources
The online Risks Forum has long been a hotbed for discussions of the relative merits of openness relating to the dissemination of knowledge about security vulnerabilities. The debate has now been rekindled, and is summarized here.
openaire +2 more sources
The Rising Tide Of Computational Vulnerability
Delicate Balance: Technics, Culture and Consequences, 1989Computer evolution brings ever greater benefits, and ever greater danger as well. Emerging are the worm, virus, and otherwise surreptitious softwares. They billiantly expose the current ethics of computer use to intense public scrutiny. They are (obliquely) t he object of research in Artificial Life studies, for they possess some of the attributes of ...
openaire +2 more sources
Societal vulnerability to computer system failures
Computers & Security, 1986The world has become more dependent on computers which are active elements in bigger systems on which human lives depend - such as critical care units in hospitals, defense systems or air traffic control systems. Hence, the need to assure correct, reliable and safe operation has become more critical. With this need has come an increase in the attention
Lucy M. Moran, Lance J. Hoffman
openaire +2 more sources
Vulnerabilities and storage security in cloud computing
2015 International Conference on Cloud Technologies and Applications (CloudTech), 2015Nowadays, Cloud computing is a major trend. It is a new data hosting technology that becomes very popular lately thanks to the amortization of costs induced to companies. Since this concept is still in its first stages, new security risks start to appear. This paper will set forth the major security issues in cloud computing and propound a new solution
Amina Mimouni+2 more
openaire +2 more sources
Scheduler Vulnerabilities and Coordinated Attacks in Cloud Computing [PDF]
In hardware virtualization a hypervisor provides multiple Virtual Machines (VMs) on a single physical system, each executing a separate operating system instance. The hypervisor schedules execution of these VMs much as the scheduler in an operating system does, balancing factors such as fairness and I/O performance.
Ravi Sundaram+3 more
openaire +2 more sources
Computer abuse perpetrators and vulnerabilities of computer systems
Proceedings of the June 7-10, 1976, national computer conference and exposition on - AFIPS '76, 1976Analysis of computer abuse experience is valuable in threat and risk studies performed to develop appropriate safeguards in computer use. A profile of computer abuse perpetrators has been developed on the basis of interviews with 17 offenders involved in a total of 15 cases.
openaire +3 more sources
Current Atherosclerosis Reports, 2020
This review aims to summarize the role of coronary computed tomography plaque analysis in identifying high-risk patients and plaques.In this review, we will describe the histopathological features of a vulnerable plaque as well as the coronary computed tomography characteristics including spotty calcification, low-attenuation fatty core, positive ...
Faheemullah Beg+2 more
openaire +3 more sources
This review aims to summarize the role of coronary computed tomography plaque analysis in identifying high-risk patients and plaques.In this review, we will describe the histopathological features of a vulnerable plaque as well as the coronary computed tomography characteristics including spotty calcification, low-attenuation fatty core, positive ...
Faheemullah Beg+2 more
openaire +3 more sources
Exposing vulnerabilities of untrusted computing platforms
2012 IEEE 30th International Conference on Computer Design (ICCD), 2012This work seeks to expose the vulnerability of un-trusted computing platforms used in critical systems to hardware Trojans and combined hardware/software attacks. As part of our entry in the Cyber Security Awareness Week (CSAW) Embedded System Challenge hosted by NYU-Poly in 2011, we developed and presented 10 such processor-level hardware Trojans ...
Yiorgos Makris+2 more
openaire +2 more sources
Research of Security Vulnerability in the Computer Network
2010 International Conference on Biomedical Engineering and Computer Science, 2010In order to solve the problem of security vulnerability in the computer network radically, it was studied for the cause of vulnerability. Solving scheme was put forward aim at one kind of vulnerability, that is, by the special scan and encryption techniques, it makes attacker can't bypass its access control.
openaire +2 more sources