Results 281 to 290 of about 202,881 (332)
Some of the next articles are maybe not open access.
Assessing computer security vulnerability
ACM SIGOPS Operating Systems Review, 1995The lack of a standard gauge for quantifying computer system vulnerability is a hindrance to communicating information about vulnerabilities, and is thus a hindrance to reducing those vulnerabilities. The inability to address this issue through uniform semantics often leads to uncoordinated efforts at combating exposure to common avenues ...
Jim Alves-Foss, Salvador Barbosa
openaire +1 more source
Vulnerability Assessment in Contemporary Computing
2023Vulnerability assessments are an important aspect of contemporary computing and cyber security. It is a process of distinguishing and assessing potential security weaknesses and vulnerabilities in a computing system or network. It involves using various tools and techniques to denote vulnerabilities and supply recommendations for mitigating them.
null Umamageswari, S. Deepa
openaire +1 more source
Communications of the ACM, 1995
The online Risks Forum has long been a hotbed for discussions of the relative merits of openness relating to the dissemination of knowledge about security vulnerabilities. The debate has now been rekindled, and is summarized here.
openaire +1 more source
The online Risks Forum has long been a hotbed for discussions of the relative merits of openness relating to the dissemination of knowledge about security vulnerabilities. The debate has now been rekindled, and is summarized here.
openaire +1 more source
Computer network vulnerabilities and monitoring
2015 9th International Symposium on Advanced Topics in Electrical Engineering (ATEE), 2015This paper presents an overview of the current computer network vulnerabilities and exploits, possibilities of monitoring the network traffic, by intercepting and duplicating it, ways of analyzing the monitored traffic in order to better understand and explain the detection of user's behavior.
Adrian Badea +2 more
openaire +1 more source
Computer unreliability and social vulnerability
Futures, 1990Abstract Many have argued that industrial societies are becoming more technology-dependent and are thus more vulnerable to technology failures. Despite the pervasiveness of computer technology, little is known about computer failures, except perhaps that they are all too common.
Tom Forester, Perry Morrison
openaire +1 more source
Societal vulnerability to computer system failures
Computers & Security, 1986The world has become more dependent on computers which are active elements in bigger systems on which human lives depend - such as critical care units in hospitals, defense systems or air traffic control systems. Hence, the need to assure correct, reliable and safe operation has become more critical. With this need has come an increase in the attention
Lance J. Hoffman, Lucy M. Moran
openaire +1 more source
Computer abuse perpetrators and vulnerabilities of computer systems
Proceedings of the June 7-10, 1976, national computer conference and exposition on - AFIPS '76, 1976Analysis of computer abuse experience is valuable in threat and risk studies performed to develop appropriate safeguards in computer use. A profile of computer abuse perpetrators has been developed on the basis of interviews with 17 offenders involved in a total of 15 cases.
openaire +1 more source
Exposing vulnerabilities of untrusted computing platforms
2012 IEEE 30th International Conference on Computer Design (ICCD), 2012This work seeks to expose the vulnerability of un-trusted computing platforms used in critical systems to hardware Trojans and combined hardware/software attacks. As part of our entry in the Cyber Security Awareness Week (CSAW) Embedded System Challenge hosted by NYU-Poly in 2011, we developed and presented 10 such processor-level hardware Trojans ...
Yier Jin +2 more
openaire +1 more source
Cloud Computing Cyber Threats and Vulnerabilities
2023Cloud computing has become an integral part of modern business operations, with organizations of all sizes and in all industries turning to the cloud to improve efficiency, reduce costs, and increase flexibility. However, the adoption of cloud computing has also introduced a range of new security challenges, as sensitive data and critical systems are ...
openaire +1 more source
Scheduler Vulnerabilities and Coordinated Attacks in Cloud Computing
2011 IEEE 10th International Symposium on Network Computing and Applications, 2011In hardware virtualization a hypervisor provides multiple Virtual Machines (VMs) on a single physical system, each executing a separate operating system instance. The hypervisor schedules execution of these VMs much as the scheduler in an operating system does, balancing factors such as fairness and I/O performance.
Zhou, Fangfei +3 more
openaire +1 more source

