Vulnerability Of Computer Systems Research Articles