Results 271 to 280 of about 19,943 (307)
Some of the next articles are maybe not open access.
Taxonomies of attacks and vulnerabilities in computer systems
IEEE Communications Surveys & Tutorials, 2008Security assessment of a system is a difficult problem. Most of the current efforts in security assessment involve searching for known vulnerabilities. Finding unknown vulnerabilities still largely remains a subjective process. The process can be improved by understanding the characteristics and nature of known vulnerabilities.
R. Williams, V. Igure
openaire +1 more source
Computers in Hospitals, Vulnerability Aspects
1991With the advancement of medicine the dependency on adequate information supply has gradually increased. In the early days of medicine the patient had only to deal with’his’ doctor who collected the data himself (if any), stored them in his own brain, where also most of his expertise was stored.
openaire +2 more sources
Cloud Computing: Vulnerability and Threat Indications
2019An innovative approach of providing and delivering resources is the new emerging technology “cloud computing.” The time demands a reduction in expenditure as an end result of financial restrictions, where cloud computing has established productive position and is seeing immense large-scale investment.
Vaishali Singh, Santosh Pandey
openaire +2 more sources
Societal Vulnerability To Communications And Computer Failures
SPIE Proceedings, 1984The world is becoming increasingly dependent on computers and communications. As these systems become more pervasive, there is a growing concern about the possibility of computer and communications network failure leading to damages for a significant segment of the population and, potentially, to the weakening of social stability. There is disagreement
openaire +2 more sources
A Categorization Framework for Common Computer Vulnerabilities and Exposures
The Computer Journal, 2009The dictionary of common vulnerabilities and exposures (CVEs) is a compilation of known security loopholes whose objective is to both facilitate the exchange of security-related information and expedite vulnerability analysis of computer systems. Its lack of categorization and generalization capability renders the dictionary ineffective when it comes ...
Yuan Zhang+2 more
openaire +2 more sources
Modeling Cloud Computing Threats and Vulnerabilities
2019Cloud-computing is a new paradigm with great potentials for delivering a wide variety of services to different types of customers. It can substitute the traditional IT infrastructure and eliminate the requirements for building and maintaining physical IT infrastructure fully or partly. As a result, cloud customers find themselves outsourcing all or a
openaire +2 more sources
Discovering New Vulnerabilities In Computer Systems
2012Vulnerability research plays a key role in preventing and defending against malicious computer system exploitations. Driven by a multi-billion dollar underground economy, cyber criminals today tirelessly launch malicious exploitations, threatening every aspect of daily computing.
Zhenyu Wu, Haining Wang
openaire +2 more sources
Vulnerability of laptop computers to volcanic ash and gas
Natural Hazards, 2012Laptop computers are vital components of critical infrastructure sectors and a common tool in broader society. As they become more widely used, their exposure to volcanic hazards will increase. Therefore, understanding how laptops will function in volcanic environments is necessary to provide suitable mitigation options. In this study, laptop computers
Jim Cole+3 more
openaire +2 more sources
Exploiting Security Vulnerabilities in Intermittent Computing
2018Energy harvesters have enabled widespread utilization of ultra-low-power devices that operate solely based on the energy harvested from the environment. Due to the unpredictable nature of harvested energy, these devices experience frequent power outages.
Archanaa S. Krishnan, Patrick Schaumont
openaire +2 more sources
2021
As threats to the security of information pervade the fabric of everyday life, this book describes how, even as the demand for information security increases, the needs of society are not being met. The result is that the confidentiality of our personal data, the integrity of our elections, and the stability of foreign relations between countries are ...
openaire +2 more sources
As threats to the security of information pervade the fabric of everyday life, this book describes how, even as the demand for information security increases, the needs of society are not being met. The result is that the confidentiality of our personal data, the integrity of our elections, and the stability of foreign relations between countries are ...
openaire +2 more sources