Results 271 to 280 of about 19,943 (307)
Some of the next articles are maybe not open access.

Taxonomies of attacks and vulnerabilities in computer systems

IEEE Communications Surveys & Tutorials, 2008
Security assessment of a system is a difficult problem. Most of the current efforts in security assessment involve searching for known vulnerabilities. Finding unknown vulnerabilities still largely remains a subjective process. The process can be improved by understanding the characteristics and nature of known vulnerabilities.
R. Williams, V. Igure
openaire   +1 more source

Computers in Hospitals, Vulnerability Aspects

1991
With the advancement of medicine the dependency on adequate information supply has gradually increased. In the early days of medicine the patient had only to deal with’his’ doctor who collected the data himself (if any), stored them in his own brain, where also most of his expertise was stored.
openaire   +2 more sources

Cloud Computing: Vulnerability and Threat Indications

2019
An innovative approach of providing and delivering resources is the new emerging technology “cloud computing.” The time demands a reduction in expenditure as an end result of financial restrictions, where cloud computing has established productive position and is seeing immense large-scale investment.
Vaishali Singh, Santosh Pandey
openaire   +2 more sources

Societal Vulnerability To Communications And Computer Failures

SPIE Proceedings, 1984
The world is becoming increasingly dependent on computers and communications. As these systems become more pervasive, there is a growing concern about the possibility of computer and communications network failure leading to damages for a significant segment of the population and, potentially, to the weakening of social stability. There is disagreement
openaire   +2 more sources

A Categorization Framework for Common Computer Vulnerabilities and Exposures

The Computer Journal, 2009
The dictionary of common vulnerabilities and exposures (CVEs) is a compilation of known security loopholes whose objective is to both facilitate the exchange of security-related information and expedite vulnerability analysis of computer systems. Its lack of categorization and generalization capability renders the dictionary ineffective when it comes ...
Yuan Zhang   +2 more
openaire   +2 more sources

Modeling Cloud Computing Threats and Vulnerabilities

2019
Cloud-computing is a new paradigm with great potentials for delivering a wide variety of services to different types of customers. It can substitute the traditional IT infrastructure and eliminate the requirements for building and maintaining physical IT infrastructure fully or partly. As a result, cloud customers find themselves outsourcing all or a
openaire   +2 more sources

Discovering New Vulnerabilities In Computer Systems

2012
Vulnerability research plays a key role in preventing and defending against malicious computer system exploitations. Driven by a multi-billion dollar underground economy, cyber criminals today tirelessly launch malicious exploitations, threatening every aspect of daily computing.
Zhenyu Wu, Haining Wang
openaire   +2 more sources

Vulnerability of laptop computers to volcanic ash and gas

Natural Hazards, 2012
Laptop computers are vital components of critical infrastructure sectors and a common tool in broader society. As they become more widely used, their exposure to volcanic hazards will increase. Therefore, understanding how laptops will function in volcanic environments is necessary to provide suitable mitigation options. In this study, laptop computers
Jim Cole   +3 more
openaire   +2 more sources

Exploiting Security Vulnerabilities in Intermittent Computing

2018
Energy harvesters have enabled widespread utilization of ultra-low-power devices that operate solely based on the energy harvested from the environment. Due to the unpredictable nature of harvested energy, these devices experience frequent power outages.
Archanaa S. Krishnan, Patrick Schaumont
openaire   +2 more sources

A Vulnerable System

2021
As threats to the security of information pervade the fabric of everyday life, this book describes how, even as the demand for information security increases, the needs of society are not being met. The result is that the confidentiality of our personal data, the integrity of our elections, and the stability of foreign relations between countries are ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy