ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Java Security Vulnerability Analysis Based on Java Access Permission Checking Tree
Mapping Intimacies
◽
10.14257/astl.2014.58.11
◽
2014
◽
Author(s):
Young-Chan Lim
◽
Hyo-Seong Park
◽
Chul-Woo Park
◽
Luna Clout
◽
Ki-Chang Kim
Keyword(s):
Vulnerability Analysis
◽
Security Vulnerability
Download Full-text
Related Documents
Cited By
References
Security Vulnerability Analysis using Ontology-based Attack Graphs
2017 14th IEEE India Council International Conference (INDICON)
◽
10.1109/indicon.2017.8488002
◽
2017
◽
Author(s):
Komal Falodiya
◽
Manik Lal Das
Keyword(s):
Vulnerability Analysis
◽
Attack Graphs
◽
Security Vulnerability
Download Full-text
A Study on The Security Vulnerability Analysis of Open an Automatic Demand Response System
Journal of Digital Convergence
◽
10.14400/jdc.2016.14.5.333
◽
2016
◽
Vol 14
(5)
◽
pp. 333-339
Author(s):
Hyeon-Ho Chae
◽
June-Kyoung Lee
◽
Kyoung-Hak Lee
Keyword(s):
Demand Response
◽
Vulnerability Analysis
◽
Security Vulnerability
◽
Response System
Download Full-text
Adaptation to Security Vulnerability Analysis
Safety and Security Review for the Process Industries
◽
10.1016/b978-1-4377-3518-5.00004-9
◽
2012
◽
pp. 13-15
Author(s):
Dennis P. Nolan
Keyword(s):
Vulnerability Analysis
◽
Security Vulnerability
Download Full-text
Security Vulnerability Analysis of Wi-Fi Connection Hijacking on the Linux-Based Robot Operating System for Drone Systems
Parallel and Distributed Computing, Applications and Technologies - Communications in Computer and Information Science
◽
10.1007/978-981-13-5907-1_49
◽
2019
◽
pp. 473-482
Author(s):
Jinyeong Kang
◽
Inwhee Joe
Keyword(s):
Operating System
◽
Vulnerability Analysis
◽
Robot Operating System
◽
Security Vulnerability
Download Full-text
Security Vulnerability Analysis at a Chemicals Facility (PSAM-0449)
Proceedings of the Eighth International Conference on Probabilistic Safety Assessment & Management (PSAM)
◽
10.1115/1.802442.paper177
◽
2006
◽
pp. 1424-1432
Keyword(s):
Vulnerability Analysis
◽
Security Vulnerability
Download Full-text
A Security Vulnerability Analysis of SoCFPGA Architectures
2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC)
◽
10.1109/dac.2018.8465932
◽
2018
◽
Author(s):
Sumanta Chaudhuri
Keyword(s):
Vulnerability Analysis
◽
Security Vulnerability
Download Full-text
Security Vulnerability Analysis of Beep Sound Pattern in Digital Door Lock
Advanced Science Letters
◽
10.1166/asl.2017.9779
◽
2017
◽
Vol 23
(10)
◽
pp. 9706-9708
Author(s):
Woo-Jung Jin
◽
Cho Rok Jung
◽
Mi-Lim Yun
◽
Seobin Kim
◽
Young-One Cho
Keyword(s):
Vulnerability Analysis
◽
Sound Pattern
◽
Security Vulnerability
◽
Door Lock
Download Full-text
A security vulnerability analysis model for dangerous goods transportation by rail – Case study: Chlorine transportation in Texas-Illinois
Safety Science
◽
10.1016/j.ssci.2018.04.026
◽
2018
◽
Vol 110
◽
pp. 230-241
◽
Cited By ~ 8
Author(s):
Masoud Khanmohamadi
◽
Morteza Bagheri
◽
Navid Khademi
◽
Seyed Farid Ghannadpour
Keyword(s):
Vulnerability Analysis
◽
Analysis Model
◽
Security Vulnerability
◽
Dangerous Goods
Download Full-text
Security vulnerability analysis and corresponding mitigation for password-based authentication using an offline personal authentication device
2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)
◽
10.1109/wispnet.2016.7566251
◽
2016
◽
Cited By ~ 2
Author(s):
Mada Alhaidary
◽
SK.Md. Mizanur Rahman
Keyword(s):
Vulnerability Analysis
◽
Security Vulnerability
◽
Password Based Authentication
◽
Personal Authentication
Download Full-text
Information Security Vulnerability Analysis System Based on Dynamic Cooperation Mechanism
2009 WRI World Congress on Software Engineering
◽
10.1109/wcse.2009.135
◽
2009
◽
Author(s):
Hu Ruo
◽
Chen Chao Tian
Keyword(s):
Information Security
◽
Vulnerability Analysis
◽
Security Vulnerability
◽
Cooperation Mechanism
◽
Analysis System
◽
Dynamic Cooperation
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close