Search Word(s) in Title, Keywords, Authors, and Abstract: Vulnerability

Performance Improvement of a Movie Recommendation System based on Personal Propensity and Secure Collaborative Filtering
Woon-hae Jeong, Se-jun Kim, Doo-soon Park and Jin Kwak
Page: 157~172, Vol. 9, No.1, 2013
Keywords: Collaborative Filtering, Movie Recommendation System, Personal Propensity, Security, Push Stack
Show / Hide Abstract

Intercepting Filter Approach to Injection Flaws
Ahmed Salem
Page: 563~574, Vol. 6, No.4, 2010
Keywords: Injection Flaws, SQL Injection, Intercepting Filter, Cross-site Scripting Vulnerability
Show / Hide Abstract

A Practical Security Risk Analysis Process and Tool for Information System
YoonJung Chung, InJung Kim and DoHoon Lee
Page: 95~100, Vol. 2, No.2, 2006
Keywords: Risk Management, Asset, Threats, Vulnerability, Countermeasure
Show / Hide Abstract

The Plan and Tools for Vulnerability Testing in Information Software-Based System
Injung Kim, Younggyo Lee and Dongho Won
Page: 75~78, Vol. 1, No.1, 2005
Keywords: Risk Analysis, Vulnerability, Asset, Threat
Show / Hide Abstract