Sciweavers

1101 search results - page 4 / 221
» On the Security and Vulnerability of PING
Sort
View
CCS
2006
ACM
13 years 10 months ago
Vulnerability analysis For evaluating quality of protection of security policies
Muhammad Abedin, Syeda Nessa, Ehab Al-Shaer, Latif...
SICHERHEIT
2010
13 years 6 months ago
Session Fixation - The Forgotten Vulnerability?
Michael Schrank, Bastian Braun, Martin Johns, Joac...
ACNS
2009
Springer
170views Cryptology» more  ACNS 2009»
14 years 3 months ago
Fragility of the Robust Security Network: 802.11 Denial of Service
The upcoming 802.11w amendment to the 802.11 standard eliminates the 802.11 deauthentication and disassociation Denial of Service (DoS) vulnerabilities. This paper presents two oth...
Martin Eian
ICST
2010
IEEE
13 years 7 months ago
Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista
—Many factors are believed to increase the vulnerability of software system; for example, the more widely deployed or popular is a software system the more likely it is to be att...
Thomas Zimmermann, Nachiappan Nagappan, Laurie A. ...
DSS
2006
91views more  DSS 2006»
13 years 8 months ago
Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach
Organizations are making substantial investments in information security to reduce the risk presented by vulnerabilities in their information technology (IT) infrastructure. Howev...
Mukul Gupta, Jackie Rees, Alok R. Chaturvedi, Jie ...