Search

Your search keyword '"Vulnerability (computing)"' showing total 78 results

Search Constraints

Start Over You searched for: Descriptor "Vulnerability (computing)" Remove constraint Descriptor: "Vulnerability (computing)" Journal ssrn electronic journal Remove constraint Journal: ssrn electronic journal
78 results on '"Vulnerability (computing)"'

Search Results

1. The Antifragility Effect: Deploying Emerging Tech in Medical Device Supply Networks to Rebuild Better

2. Information Disclosure and Financial Stability

3. Prevention of XSS attack using Cryptography & API integration with Web Security

4. Targeting Interacting Agents

5. DevSecOps: A Boon to the IT Industry

6. A DeFi Bank Run: Iron Finance, IRON Stablecoin, and the Fall of TITAN

7. Family Ties: The Familial Privacy Implications of Direct to Consumer Genetic Testing

8. A Review on Cooperative Bait Based Intrusion Detection in MANET

9. Virus At The Gates

10. Vulnerability of Scale-Free Cryptocurrency Networks to Double-Spending Attacks

11. Quantification of the Resilience and Vulnerability of HIV-1 Native Glycan Shield at Atomistic Detail

12. Literature Review on Security Issues and Limitations in Biometric Applications

13. Measuring Dark Web Marketplaces via Bitcoin Transactions: From Birth to Independence

14. 'No Holds Barred' and the New Vulnerability: Are We in for a Re-Run of the Cuban Missile Crisis in Cyberspace?

15. Compromising Systems: Implementing Hacking Phases

16. Highly-Secure Backdoors: Internet of Traitorous Things (IoTT)

17. The Nature of Online Information: A Key to the Difference for Digital Citizen's Access to Justice

18. Software Defined Security Architecture for a Smart Home Networks Using Token Sharing Mechanism

19. Vulnerability of Voting Paradoxes As a Criteria For Voting Procedure Selection

20. Applications of Machine Learning Algorithms for Countermeasures to Cyber Attacks

21. Cross Site Scripting (XSS) and SQL-Injection Attack Detection in Web Application

22. Viewpoint of Probabilistic Risk Assessment in Artificial Enabled Social Engineering Attacks

23. Wannacry, Ransomware, and the Emerging Threat to Corporations

24. Book Review: Cyber Wars: The Next Threat to National Security and What to Do About it

25. Inappropriate Detailing Impact Towards Ductility of High Rise Reinforced Concrete Moment Frames Building in High Seismicity Area

26. A Multidimensional Graphical Visualization of the Oil Prices from 1960 to 2019

27. The Radical Transparency of Cities - Lost Public Anonymity and its Consequences

28. Protecting ‘Cybersecurity & Resiliency’ of Nation’s Critical Infrastructure – Energy, Oil & Gas

29. Now the Code Runs Itself: On-Chain and Off-Chain Governance of Blockchain Technologies

31. Coming in from the Cold: A Safe Harbor from the CFAA and the DMCA 1201 for Security Researchers

32. Effects of Phishing Emails on College Students

33. Voluntary Reporting of Cybersecurity Incidents

34. Stress Testing Frameworks and Practices in Dual Banking System: A Preliminary Assessment

35. Detecting Data Leaks Via SQL Injection Prevention

36. Taking Stock: Estimating Vulnerability Rediscovery

37. Integrated Framework for Information Security Investment and Cyber Insurance

38. Phishing & a Live Technical Analysis

39. Cloud Computing: Quandary Over Defining ‘What’ Is Protected and ‘Who’ Are Regulated

40. Optimal Level and Allocation of Cybersecurity Spending: Model and Formula

41. Vulnerability Analysis of the Financial Network

42. Mitigating Zero-Day Attacks in IoT Using a Strategic Framework

43. Optimal Sourcing with Ambiguously Correlated Suppliers

44. Malware Counter-Proliferation and the Wassenaar Arrangement

45. Competitive Markets with Asymmetric Information II: Entry, Incumbent's Vulnerability and Efficiency

46. An Improved Lightweight Privacy Preserving Authentication Scheme for SIP-Based-VoIP Using Smart Card (MPhil – Dissertation)

47. A Matter of Time: On the Transitory Nature of Cyber Weapons

48. Cyber-Enabled Warfare and Deterrence: The Capability/Vulnerability Paradox of U.S. Doctrine and Technologies

49. An Integrated Macroprudential Stress Test of Bank Liquidity and Solvency

50. Public Warnings in Counterterrorism Operations: Managing the 'Cry-Wolf' Effect

Catalog

Books, media, physical & digital resources