skip to main content
Resultados 1 2 3 4 5 next page
Mostrar Somente
Refinado por: Base de dados/Biblioteca: SpringerLINK Lecture Notes in Computer Science (2015) remover tipo de recurso: Anais de Congresso remover
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Vulnerability Against Internet Disruptions – A Graph-Based Perspective
Material Type:
Ata de Congresso
Adicionar ao Meu Espaço

Vulnerability Against Internet Disruptions – A Graph-Based Perspective

Baumann, Annika ; Fabian, Benjamin Rome, Erich ; Wolthusen, Stephen ; Theocharidou, Marianthi

Critical Information Infrastructures Security, p.120-131 [Periódico revisado por pares]

Cham: Springer International Publishing

Texto completo disponível

2
Risk and Vulnerability Analysis of Critical Infrastructure
Material Type:
Ata de Congresso
Adicionar ao Meu Espaço

Risk and Vulnerability Analysis of Critical Infrastructure

Wan, Kaiyu ; Alagar, Vangalur Hussain, Abir ; Huang, De-Shuang ; Han, Kyungsook

Intelligent Computing Methodologies, p.54-66 [Periódico revisado por pares]

Cham: Springer International Publishing

Texto completo disponível

3
Graph-Based Hydraulic Vulnerability Assessment of Water Distribution Networks
Material Type:
Ata de Congresso
Adicionar ao Meu Espaço

Graph-Based Hydraulic Vulnerability Assessment of Water Distribution Networks

Fragiadakis, Michalis ; Xanthos, Savvas ; Eliades, Demetrios G. ; Gagatsis, Anastasis ; Christodoulou, Symeon E. Kyriakides, Elias ; Polycarpou, Marios M. ; Panayiotou, Christos G. ; Ellinas, Georgios

Critical Information Infrastructures Security, p.81-87 [Periódico revisado por pares]

Cham: Springer International Publishing

Texto completo disponível

4
Predicting Severity of Software Vulnerability Based on Grey System Theory
Material Type:
Ata de Congresso
Adicionar ao Meu Espaço

Predicting Severity of Software Vulnerability Based on Grey System Theory

Geng, Jinkun ; Ye, Daren ; Luo, Ping Zomaya, Albert ; Wang, Guojin ; Martinez, Gregorio ; Li, Kenli

Algorithms and Architectures for Parallel Processing, p.143-152 [Periódico revisado por pares]

Cham: Springer International Publishing

Texto completo disponível

5
Risk Analysis and Quantification of Vulnerability in Maritime Transportation Network Using AIS Data
Material Type:
Ata de Congresso
Adicionar ao Meu Espaço

Risk Analysis and Quantification of Vulnerability in Maritime Transportation Network Using AIS Data

Ide, Kiyotaka ; Ponnambalam, Loganathan ; Namatame, Akira ; Xiuju, Fu ; Goh, Rick Siow Mong Negenborn, Rudy R. ; Voß, Stefan ; Corman, Francesco

Computational Logistics, p.139-151 [Periódico revisado por pares]

Cham: Springer International Publishing

Texto completo disponível

6
Measuring Territorial Vulnerability? An Attempt of Qualification and Quantification
Material Type:
Ata de Congresso
Adicionar ao Meu Espaço

Measuring Territorial Vulnerability? An Attempt of Qualification and Quantification

Renard, Florent ; Soto, Didier Apduhan, Bernady O. ; Falcão, Maria Irene ; Gervasi, Osvaldo ; Rocha, Jorge Gustavo ; Taniar, David ; Rocha, Ana Maria A. C. ; Misra, Sanjay ; Murgante, Beniamino ; Torre, Carmelo

Computational Science and Its Applications – ICCSA 2014, p.331-343 [Periódico revisado por pares]

Cham: Springer International Publishing

Texto completo disponível

7
Vulnerability Analysis Using Google and Shodan
Material Type:
Ata de Congresso
Adicionar ao Meu Espaço

Vulnerability Analysis Using Google and Shodan

Simon, Kai Persiano, Giuseppe ; Foresti, Sara

Cryptology and Network Security, p.725-730 [Periódico revisado por pares]

Cham: Springer International Publishing

Texto completo disponível

8
Risk-Driven Vulnerability Testing: Results from eHealth Experiments Using Patterns and Model-Based Approach
Material Type:
Ata de Congresso
Adicionar ao Meu Espaço

Risk-Driven Vulnerability Testing: Results from eHealth Experiments Using Patterns and Model-Based Approach

Vernotte, Alexandre ; Botea, Cornel ; Legeard, Bruno ; Molnar, Arthur ; Peureux, Fabien Großmann, Jürgen ; Felderer, Michael ; Wendland, Marc-Florian ; Seehusen, Fredrik

Risk Assessment and Risk-Driven Testing, p.93-109 [Periódico revisado por pares]

Cham: Springer International Publishing

Texto completo disponível

9
Automated Extraction of Vulnerability Information for Home Computer Security
Material Type:
Ata de Congresso
Adicionar ao Meu Espaço

Automated Extraction of Vulnerability Information for Home Computer Security

Weerawardhana, Sachini ; Mukherjee, Subhojeet ; Ray, Indrajit ; Howe, Adele Fong, Philip W. L. ; Zincir Heywood, Nur ; Cuppens, Frédéric ; Garcia-Alfaro, Joaquin

Foundations and Practice of Security, p.356-366 [Periódico revisado por pares]

Cham: Springer International Publishing

Texto completo disponível

10
Bifocals: Analyzing WebView Vulnerabilities in Android Applications
Material Type:
Ata de Congresso
Adicionar ao Meu Espaço

Bifocals: Analyzing WebView Vulnerabilities in Android Applications

Chin, Erika ; Wagner, David Kim, Yongdae ; Lee, Heejo ; Perrig, Adrian

Information Security Applications, p.138-159 [Periódico revisado por pares]

Cham: Springer International Publishing

Texto completo disponível

Resultados 1 2 3 4 5 next page

Personalize Seus Resultados

  1. Editar

Refine Search Results

Expandir Meus Resultados

  1.   

Mostrar Somente

  1. Revistas revisadas por pares (774)

Data de Publicação 

De até
  1. Antes de2000  (13)
  2. 2000Até2004  (84)
  3. 2005Até2009  (8)
  4. 2010Até2015  (368)
  5. Após 2015  (314)
  6. Mais opções open sub menu

Idioma 

  1. Inglês  (778)
  2. Japonês  (22)
  3. Russo  (2)
  4. Mais opções open sub menu

Buscando em bases de dados remotas. Favor aguardar.