Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Ata de Congresso
|
![]() |
Vulnerability Against Internet Disruptions – A Graph-Based PerspectiveBaumann, Annika ; Fabian, Benjamin Rome, Erich ; Wolthusen, Stephen ; Theocharidou, MarianthiCritical Information Infrastructures Security, p.120-131 [Periódico revisado por pares]Cham: Springer International PublishingTexto completo disponível |
2 |
Material Type: Ata de Congresso
|
![]() |
Risk and Vulnerability Analysis of Critical InfrastructureWan, Kaiyu ; Alagar, Vangalur Hussain, Abir ; Huang, De-Shuang ; Han, KyungsookIntelligent Computing Methodologies, p.54-66 [Periódico revisado por pares]Cham: Springer International PublishingTexto completo disponível |
3 |
Material Type: Ata de Congresso
|
![]() |
Graph-Based Hydraulic Vulnerability Assessment of Water Distribution NetworksFragiadakis, Michalis ; Xanthos, Savvas ; Eliades, Demetrios G. ; Gagatsis, Anastasis ; Christodoulou, Symeon E. Kyriakides, Elias ; Polycarpou, Marios M. ; Panayiotou, Christos G. ; Ellinas, GeorgiosCritical Information Infrastructures Security, p.81-87 [Periódico revisado por pares]Cham: Springer International PublishingTexto completo disponível |
4 |
Material Type: Ata de Congresso
|
![]() |
Predicting Severity of Software Vulnerability Based on Grey System TheoryGeng, Jinkun ; Ye, Daren ; Luo, Ping Zomaya, Albert ; Wang, Guojin ; Martinez, Gregorio ; Li, KenliAlgorithms and Architectures for Parallel Processing, p.143-152 [Periódico revisado por pares]Cham: Springer International PublishingTexto completo disponível |
5 |
Material Type: Ata de Congresso
|
![]() |
Risk Analysis and Quantification of Vulnerability in Maritime Transportation Network Using AIS DataIde, Kiyotaka ; Ponnambalam, Loganathan ; Namatame, Akira ; Xiuju, Fu ; Goh, Rick Siow Mong Negenborn, Rudy R. ; Voß, Stefan ; Corman, FrancescoComputational Logistics, p.139-151 [Periódico revisado por pares]Cham: Springer International PublishingTexto completo disponível |
6 |
Material Type: Ata de Congresso
|
![]() |
Measuring Territorial Vulnerability? An Attempt of Qualification and QuantificationRenard, Florent ; Soto, Didier Apduhan, Bernady O. ; Falcão, Maria Irene ; Gervasi, Osvaldo ; Rocha, Jorge Gustavo ; Taniar, David ; Rocha, Ana Maria A. C. ; Misra, Sanjay ; Murgante, Beniamino ; Torre, CarmeloComputational Science and Its Applications – ICCSA 2014, p.331-343 [Periódico revisado por pares]Cham: Springer International PublishingTexto completo disponível |
7 |
Material Type: Ata de Congresso
|
![]() |
Vulnerability Analysis Using Google and ShodanSimon, Kai Persiano, Giuseppe ; Foresti, SaraCryptology and Network Security, p.725-730 [Periódico revisado por pares]Cham: Springer International PublishingTexto completo disponível |
8 |
Material Type: Ata de Congresso
|
![]() |
Risk-Driven Vulnerability Testing: Results from eHealth Experiments Using Patterns and Model-Based ApproachVernotte, Alexandre ; Botea, Cornel ; Legeard, Bruno ; Molnar, Arthur ; Peureux, Fabien Großmann, Jürgen ; Felderer, Michael ; Wendland, Marc-Florian ; Seehusen, FredrikRisk Assessment and Risk-Driven Testing, p.93-109 [Periódico revisado por pares]Cham: Springer International PublishingTexto completo disponível |
9 |
Material Type: Ata de Congresso
|
![]() |
Automated Extraction of Vulnerability Information for Home Computer SecurityWeerawardhana, Sachini ; Mukherjee, Subhojeet ; Ray, Indrajit ; Howe, Adele Fong, Philip W. L. ; Zincir Heywood, Nur ; Cuppens, Frédéric ; Garcia-Alfaro, JoaquinFoundations and Practice of Security, p.356-366 [Periódico revisado por pares]Cham: Springer International PublishingTexto completo disponível |
10 |
Material Type: Ata de Congresso
|
![]() |
Bifocals: Analyzing WebView Vulnerabilities in Android ApplicationsChin, Erika ; Wagner, David Kim, Yongdae ; Lee, Heejo ; Perrig, AdrianInformation Security Applications, p.138-159 [Periódico revisado por pares]Cham: Springer International PublishingTexto completo disponível |