Search

Your search keyword '"Vulnerability (computing)"' showing total 7,220 results

Search Constraints

Start Over You searched for: Descriptor "Vulnerability (computing)" Remove constraint Descriptor: "Vulnerability (computing)" Topic computer science Remove constraint Topic: computer science
7,220 results on '"Vulnerability (computing)"'

Search Results

1. Contagion risks and security investment in directed networks

2. Privacy-Aware Laser Wireless Power Transfer for Aerial Multi-Access Edge Computing: A Colonel Blotto Game Approach

3. Adaptive Neural Event-Triggered Control of Networked Markov Jump Systems Under Hybrid Cyberattacks

4. Query-Efficient Black-Box Adversarial Attacks Guided by a Transfer-Based Prior

5. A Secure Sensor Fusion Framework for Connected and Automated Vehicles Under Sensor Attacks

6. Fingerprint Presentation Attack Detector Using Global-Local Model

7. Defending Adversarial Attacks via Semantic Feature Manipulation

8. Model of Execution Trace Obfuscation Between Threads

9. Fingerprinting Movements of Industrial Robots for Replay Attack Detection

10. LPGA: Location Privacy-Guaranteed Offloading Algorithm in Cache-Enabled Edge Clouds

11. DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification

13. (In)secure Acoustic Mobile Authentication

14. Improved Premium Model of Voltage Sag Insurance Based on Voltage Sag Risk

15. Dynamic defenses in cyber security: Techniques, methods and challenges

16. Reliability versus Vulnerability of N-Version Programming Cloud Service Component With Dynamic Decision Time Under Co-Resident Attacks

17. Security of Cyber-Physical Systems: Design of a Security Supervisor to Thwart Attacks

18. Data Poisoning Attacks on Federated Machine Learning

19. Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack

20. Accurate and Robust Malware Detection: Running XGBoost on Runtime Data From Performance Counters

21. Revealing a New Vulnerability of Distributed State Estimation: A Data Integrity Attack and an Unsupervised Detection Algorithm

22. On Vulnerability and Resilience of Cyber-Physical Power Systems: A Review

23. Factors Affecting Pedestrians’ Trust in Automated Vehicles: Literature Review and Theoretical Model

24. Design and Reliability Performance of Wireless Backhaul Networks Under Weather-Induced Correlated Failures

25. A Machine Learning-Based Vulnerability Analysis for Cascading Failures of Integrated Power-Gas Systems

26. An Intrusion Detection Mechanism for Secured IoMT Framework Based on Swarm-Neural Network

27. BAFL: A Blockchain-Based Asynchronous Federated Learning Framework

28. A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices

29. Vulnerability Forecasting: Theory and Practice

30. DSLN: Securing Internet of Things Through RF Fingerprint Recognition in Low-SNR Settings

31. PFLUA-DIoT: A Pairing Free Lightweight and Unlinkable User Access Control Scheme for Distributed IoT Environments

32. RTL-ConTest: Concolic Testing on RTL for Detecting Security Vulnerabilities

33. Strategies for Practical Hybrid Attack Graph Generation and Analysis

34. A Chosen Random Value Attack on WPA3 SAE Authentication Protocol

35. A Test Bed for Detecting False Data Injection Attacks in Systems With Distributed Energy Resources

36. SecurePilot: Improving Wireless Security of Single-Antenna IoT Devices

37. New Aspects of Integrity Levels in Automotive Industry-Cybersecurity of Automated Vehicles

38. Evaluation of Cross-Layer Network Vulnerability of Power Communication Network Based on Multi-Dimensional and Multi-Layer Node Importance Analysis

40. A study on soft computing optimizing techniques

41. Vulnerability Assessment for Coupled Network Consisting of Power Grid and EV Traffic Network

42. Perturbation-Seeking Generative Adversarial Networks: A Defense Framework for Remote Sensing Image Scene Classification

43. CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain Adaptation

44. Disparate Vulnerability to Membership Inference Attacks

45. Anti-Forensics for Face Swapping Videos via Adversarial Training

46. Cyber Security of Market-Based Congestion Management Methods in Power Distribution Systems

47. Vulnerability-Oriented Fuzz Testing for Connected Autonomous Vehicle Systems

48. Common irregularities and its effects on reinforced concrete building response

49. Security Analysis of Linearization for Nonlinear Networked Control Systems Under DoS

50. Latency Minimization in Covert Communication-Enabled Federated Learning Network

Catalog

Books, media, physical & digital resources