Suggested Topics within your search.
Suggested Topics within your search.
-
1
-
2
-
3by Brandão, Antonio José dos Santos“... linguagem OWL e as informações catalogadas pelo projeto CVE [Common Vulnerabilities and Exposures). Diversas...”
Published 2004
Get full text
Others -
4by Antonio José dos Santos Brandão“... linguagem OWL e as informações catalogadas pelo projeto CVE [Common Vulnerabilities and Exposures). Diversas...”
Published 2004
Get full text
-
5by Jukka Ruohonen“... Vulnerabilities and Exposures (CVEs) in the National Vulnerability Database (NVD) and the Common Vulnerability...”
Published 2019-07-01
Get full text
Article -
6“...碩士 === 長庚大學 === 資訊管理學系 === 105 === According to the Common Vulnerabilities and Exposures (CVE...”
Get full text
Others -
7
-
8“... virtual hardware of Qemu and find 16 bugs with 1 CVE (Common Vulnerabilities and Exposures) number...”
Get full text
Article -
9by Janson, Fredrik“... with the Linux system it is intended to be executed on. The Common Vulnerabilities and Exposures (CVE) standard...”
Published 2018
Get full text
Others -
10by Aiello, Brady Benjamin“... data about cyber attacks has been captured using a repository of common vulnerabilities and exposures...”
Published 2018
Get full text
Get full text
Others -
11“... for this study consisted of 83,015 instances from the common vulnerabilities and exposures (CVE) database (early...”
Get full text
Article -
12“.... The main threats of these protocols as well as the Common Vulnerabilities and Exposures (CVE...”
Get full text
Article -
13“... Vulnerabilities and Exposures (CVE) Information database, and then the vulnerabilities ratings of various Internet...”
Get full text
Others -
14“... or system administrators by analyzing information from Twitter and Common Vulnerabilities and Exposures (CVE...”
Get full text
Others -
15“... of vulnerabilities, written in C and C++, reported in Common Vulnerabilities and Exposures (CVE), will be done...”
Get full text
Others -
16by Hätty, Niklas“... one CVE-entry (Common Vulnerabilities and Exposures) in the incident description is a key factor...”
Published 2019
Get full text
Others -
17“... service attacks and common vulnerabilities and exposures attacks. We use three types of datasets...”
Get full text
Article -
18by Li, Yun Lillian“... Vulnerabilities and Exposures (CVE) provides a means of solving the disparity in vulnerability names used...”
Published 2013
Get full text
Get full text
Get full text
-
19“... CVEs (common vulnerabilities and exposures) specific to the IoT field were identified. CVEs...”
Get full text
Article -
20by Kenta Kanakogi, Hironori Washizaki, Yoshiaki Fukazawa, Shinpei Ogata, Takao Okubo, Takehisa Kato, Hideyuki Kanuka, Atsuo Hazeyama, Nobukazu Yoshioka“... Vulnerabilities and Exposures (CVE) provides known vulnerabilities of products, while the Common Attack Pattern...”
Published 2021-07-01
Get full text
Article