A Study of Gaps in Attack Analysis
نویسندگان
چکیده
منابع مشابه
Spatial Pattern and Characteristic of Tree-fall Gaps to Approach Ecological Forestry in Northern Iran
Gaps created by falling trees (tree-fall gaps) are a natural disturbance in forest ecosystems. Understanding scale, pattern and the effect of gaps on regeneration is important to current and future forest management. The aim of this study was to determine the size, shape and the spatial pattern of tree-fall gaps and of associated regeneration. This study was carried out in three parcels (No.15,...
متن کاملInformation and data flow analysis for forestry sector in Iran as a basic requirement for designing a forest information system (FIS)
ABSTRACT The aim of this study was to evaluate the status of information on forest and data transfer and to identify the gaps in information and data flow in forestry sector in Iran. The study evaluated the data and information flow in three levels (control offices level, provincial offices level and organizational offices level) using the document analysis and questioning (interviews and ques...
متن کاملAnalysis of Ottoman Attack on Yemen: Reasons, Consequences and Results
The 10th century AH was very important for Muslim lands, including Yemen in the era of Taherian (858-945 AH), because during this time, Portugal as a colonist country, in order to have access to new maritime routes, to seize Muslim commercial centers, as well as monopoly of Indian medicine trade, was moving eastward, into Yemen. At the same time, the Ottoman Empire, which was one somehow the fl...
متن کاملA particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs
To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...
متن کاملAn Ant Colony Optimization Algorithm for Network Vulnerability Analysis
Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...
متن کامل