Academic literature on the topic 'Security Vulnerabilities'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security Vulnerabilities.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security Vulnerabilities"
Neamah, Muthanna Ibrahim. "The Security Vulnerabilities in Websites the Security." International Journal of Psychosocial Rehabilitation 24, no. 5 (2020): 4319–24. http://dx.doi.org/10.37200/ijpr/v24i5/pr2020147.
Full textJeo John, Precious, and Sumit Surendran. "Vulnerabilities Detection by Matching with known Vulnerabilities." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 01 (2024): 1–10. http://dx.doi.org/10.55041/ijsrem28422.
Full textTAŞ, Ruhi. "Smart Contract Security Vulnerabilities." Erzincan Üniversitesi Fen Bilimleri Enstitüsü Dergisi 16, no. 1 (2023): 196–211. http://dx.doi.org/10.18185/erzifbed.1105551.
Full textBrumă, Ovidiu-Vasile. "Vulnerabilities of Information Systems." International Journal of Information Security and Cybercrime 9, no. 1 (2020): 9–14. http://dx.doi.org/10.19107/ijisc.2020.01.01.
Full textShahriar, Hossain, and Mohammad Zulkernine. "Mitigating program security vulnerabilities." ACM Computing Surveys 44, no. 3 (2012): 1–46. http://dx.doi.org/10.1145/2187671.2187673.
Full textCostinela-Luminiţa, Ciobanu (Defta), and Ciobanu (Iacob) Nicoleta-Magdalena. "E-learning Security Vulnerabilities." Procedia - Social and Behavioral Sciences 46 (2012): 2297–301. http://dx.doi.org/10.1016/j.sbspro.2012.05.474.
Full textBojanova, Irena, and John J. Guerrerio. "Labeling Software Security Vulnerabilities." IT Professional 25, no. 5 (2023): 64–70. http://dx.doi.org/10.1109/mitp.2023.3314368.
Full textHafsa, Ashraf, Alenezi Mamdouh, Nadeem Muhammad, and Javid Yasir. "Security assessment framework for educational ERP systems." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (2019): 5570–85. https://doi.org/10.11591/ijece.v9i6.pp5570-5585.
Full textFedrik, Dr E. J. Thomson, A. Vinitha, and B. Vanitha. "Review on Vulnerabilities of IoT Security." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (2019): 1117–19. http://dx.doi.org/10.31142/ijtsrd24020.
Full textJalgasbaevna, PerdebaevaInabat. "Identifying andMitigating Security Vulnerabilities inWeb Applications." American Journal of Applied Science and Technology 5, no. 5 (2025): 10–11. https://doi.org/10.37547/ajast/volume05issue05-03.
Full textDissertations / Theses on the topic "Security Vulnerabilities"
Xenitellis, Simeon. "On the identification of security vulnerabilities." Thesis, Royal Holloway, University of London, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.538785.
Full textSandgren, Per. "Security Assessment and *nix Package Vulnerabilities." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16723.
Full textBorstad, Ole Gunnar. "Finding Security Patterns to Countermeasure Software Vulnerabilities." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8850.
Full textLarsson, Josephine, and Ida Waller. "Security in wireless networks : Vulnerabilities and Countermeasures." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2380.
Full textRahimi, Sanaz. "SECURITY VULNERABILITIES: DISCOVERY, PREDICTION, EFFECT, AND MITIGATION." OpenSIUC, 2013. https://opensiuc.lib.siu.edu/dissertations/696.
Full textLiaqat, Imran. "Vulnerabilities in Security Products for Computers 2006-2008." Thesis, Linköping University, Department of Electrical Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-19472.
Full textTaylor, Barry. "Identitying vulnerabilities and controls in complex composite security architectures." Thesis, University of Aberdeen, 2014. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=225757.
Full textMorris, Joseph C. "Identifying potential vulnerabilities in software designs." Virtual Press, 2007. http://liblink.bsu.edu/uhtbin/catkey/1380105.
Full textGaboriau-Couanau, Clément. "Security of Embedded Software : An Analysis of Embedded Software Vulnerabilities and Related Security Solutions." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215703.
Full textTevis, Jay-Evan J. Hamilton John A. "Automatic detection of software security vulnerabilities in executable program files." Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Summer/doctoral/TEVIS_JAY-EVAN_36.pdf.
Full textBooks on the topic "Security Vulnerabilities"
Maurushat, Alana. Disclosure of Security Vulnerabilities. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5004-6.
Full textCordner, Lee. Maritime Security Risks, Vulnerabilities and Cooperation. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-62755-7.
Full textRomanosky, Sasha. Managing and auditing IT vulnerabilities. The Institute of Internal Auditors, 2006.
Find full textThermos, Peter. Securing VoIP networks: Threats, vulnerabilities, and countermeasures. Addison-Wesley, 2007.
Find full textMaurushat, Alana. Disclosure of Security Vulnerabilities: Legal and Ethical Issues. Springer London, 2013.
Find full textNational Infrastructure Protection Center (U.S.). Best practices for wireless fidelity (802.11b) network vulnerabilities. National Infrastructure Protection Center, 2002.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. Vulnerabilities highlight the need for more effective web security management. U.S. Dept. of Homeland Security, Office of Inspector General, 2009.
Find full text1977-, McDonald John, and Schuh Justin, eds. The art of software security assessment: Identifying and preventing software vulnerabilities. Addison-Wesley, 2007.
Find full textNational Research Council (U.S.). Committee on Assessing Vulnerabilities Related to the Nation's Chemical Infrastructure., National Research Council (U.S.). Division on Earth and Life Studies., and National Research Council (U.S.). Transportation Research Board., eds. Terrorism and the chemical infrastructure: Protecting people and reducing vulnerabilities. National Academies Press, 2006.
Find full textJohn, Adams. Remaking American security: Supply chain vulnerabilities & national security risks across the U.S. defense industrial base. Alliance for American Manufacturing, 2013.
Find full textBook chapters on the topic "Security Vulnerabilities"
Lakshmiraghavan, Badrinarayanan. "Security Vulnerabilities." In Pro ASP.NET Web API Security. Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-5783-7_15.
Full textLiska, Allan. "Vulnerabilities in NTP." In NTP Security. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2412-0_3.
Full textMcCreight, Robert. "Reconceptualizing Security Vulnerabilities." In Handbook of Security Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-51761-2_43-1.
Full textMcCreight, Robert. "Reconceptualizing Security Vulnerabilities." In Handbook of Security Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-319-91875-4_43.
Full textSharma, Sachin Kumar, Arjun Singh, Punit Gupta, and Vijay Kumar Sharma. "Web Security Vulnerabilities." In Cybersecurity. CRC Press, 2021. http://dx.doi.org/10.1201/9781003145042-12.
Full textWiddowson, Amanda. "Organisational vulnerabilities." In Humans and Cyber Security. CRC Press, 2025. https://doi.org/10.1201/9781003427681-5.
Full textWiddowson, Amanda. "Individual vulnerabilities." In Humans and Cyber Security. CRC Press, 2025. https://doi.org/10.1201/9781003427681-4.
Full textGhosh, Anup K., Kurt Baumgarten, Jennifer Hadley, and Steven Lovaas. "Web-Based Vulnerabilities." In Computer Security Handbook. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118851678.ch21.
Full textCampbell, Tony. "Threats and Vulnerabilities." In Practical Information Security Management. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1685-9_2.
Full textMartellini, Maurizio, Stanislav Abaimov, Sandro Gaycken, and Clay Wilson. "Modeling Vulnerabilities." In Information Security of Highly Critical Wireless Networks. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52905-9_6.
Full textConference papers on the topic "Security Vulnerabilities"
V, Mareeswari, Vijayan R, and Ashish Shukla. "Bluetooth Vulnerabilities and Security." In 2025 International Conference on Emerging Smart Computing and Informatics (ESCI). IEEE, 2025. https://doi.org/10.1109/esci63694.2025.10987941.
Full textDhabliya, Dharmesh, N. Thangarasu, Shivam Khurana, X. Mercilin Raajini, Shobhit Goyal, and D. T. Arunkumar. "Vehicular Network Security: Threats, Vulnerabilities and Countermeasures." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724268.
Full textYih, Jason, Katerina Goseva-Popstojanova, and Michel Cukier. "On Security Vulnerabilities in Transportation IoT Devices." In 2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2025. https://doi.org/10.1109/dsn64029.2025.00061.
Full textSirija, M., Yashwant V. Dongre, Akhilendra Pratap Singh, V. Haripriya, Prateek Aggarwal, and Satendra Singh. "Investigating the Vulnerabilities of Encapsulating Security Payload in Wireless Network Security." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724908.
Full textIyer, Ravishankar K. "Security vulnerabilities." In the 2006 ACM Symposium. ACM Press, 2006. http://dx.doi.org/10.1145/1128817.1128823.
Full textHernandez, Juan Carlos Galan, and Miguel Angel Leon Chavez. "Moodle security vulnerabilities." In 2008 5th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE). IEEE, 2008. http://dx.doi.org/10.1109/iceee.2008.4723399.
Full textRotella, Pete. "Software security vulnerabilities." In ICSE '18: 40th International Conference on Software Engineering. ACM, 2018. http://dx.doi.org/10.1145/3194707.3194708.
Full textDawood, Harith A., and Khalid F. Jassim. "Mitigating IPv6 Security Vulnerabilities." In 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT). IEEE, 2013. http://dx.doi.org/10.1109/acsat.2013.67.
Full textYadav, Saurav, Aviral Apurva, Pranshu Ranakoti, Shashank Tomer, and Nihar Ranjan Roy. "Android vulnerabilities and security." In 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN). IEEE, 2017. http://dx.doi.org/10.1109/ic3tsn.2017.8284477.
Full textYang, Xueying, Evgenios Karampatzakis, Christian Doerr, and Fernando Kuipers. "Security Vulnerabilities in LoRaWAN." In 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE, 2018. http://dx.doi.org/10.1109/iotdi.2018.00022.
Full textReports on the topic "Security Vulnerabilities"
Murphy, S. BGP Security Vulnerabilities Analysis. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4272.
Full textSeacord, Robert C., and Allen D. Householder. A Structured Approach to Classifying Security Vulnerabilities. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada430968.
Full textPritchard, Jack K., and Michael Moon. Energy Security: Reducing Vulnerabilities to Global Energy Networks. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada497815.
Full textMiguel De Vera, Anton, Viktoriia Hamaiunova, Réka Koleszár, and Giada Pasquettaz. Future Resilience of the European Technology Security Policy Paper. European Center for Populism Studies (ECPS), 2024. http://dx.doi.org/10.55271/pop0004.
Full textBlack, Paul E., and Elizabeth N. Fong. Report of the Workshop on Software Measures and Metrics to Reduce Security Vulnerabilities (SwMM-RSV). National Institute of Standards and Technology, 2016. http://dx.doi.org/10.6028/nist.sp.500-320.
Full textSeyuba, Katongo. Climate, Peace and Security in Eastern Democratic Republic of the Congo. Stockholm International Peace Research Institute, 2025. https://doi.org/10.55163/tcsw2134.
Full textHoffman, Wyatt. "Making AI Work for Cyber Defense: The Accuracy-Robustness Tradeoff ". Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/2021ca007.
Full textCarlos, Jean Clarisse. Bridging Resilience: Women at the Crossroads of Peace, Security, and Disaster Risk Management in the Philippines. Philippine Institute for Development Studies, 2025. https://doi.org/10.62986/pn2025.02.
Full textTayeb, Shahab. Protecting Our Community from the Hidden Vulnerabilities of Today’s Intelligent Transportation Systems. Mineta Transportation Institute, 2022. http://dx.doi.org/10.31979/mti.2022.2132.
Full textPerdigão, Rui A. P. Beyond Quantum Security with Emerging Pathways in Information Physics and Complexity. Synergistic Manifolds, 2022. http://dx.doi.org/10.46337/220602.
Full text