نتایج جستجو برای: graph vulnerability

تعداد نتایج: 239961  

2009
Xuejiao Liu Debao Xiao Nian Ma Jie Yu

Nowadays attacks are becoming increasingly frequent and sophisticated, and they are also becoming increasingly interconnected. Recent works in network security have demostrated the fact that combinations of vulnerability exploits are the typical means by which an attacker can break into a network. It is therefore in great need of performing vulnerability analysis to do security analysis first a...

2016
P. Dundar A. Aytac E. Kilic

Abstract: The most widely used and well-known vulnerability measures of a connected graph are based on the neighbourhood concept. It takes into account neighbour-integrity, edge-integrity and accessibility number. In this work we define and examine common-neighbourhood of a connected graph as a new global connectivity measure. Our measure examines the neighbourhoods of all pairs of vertices of ...

2008
Gianni Tedesco Uwe Aickelin

The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in an understandable way. Several algorithms exist for this purpose which use attack graphs to model the ways in which attacks can be combined. These algorithms can be classified in to two broad categories namely scenari...

2004
Rosa Gil Jaime Delgado Zièd Choukair

The goal is to build a general framework for ad hoc applications over large networks using semantics and complex systems analysis. The first part deals with semantics because applications need to be described. Ontologies are used to achieve it. They systematize application knowledge in a graph. Sometimes, the amount of information can be huge, in other words, the graph could be a large network....

Journal: :CoRR 2015
Mahantesh Halappanavar Eduardo Cotilla Sanchez Emilie Hogan Daniel Duncan Zhenyu Huang Paul Hines

Modeling power transmission networks is an important area of research with applications such as vulnerability analysis, study of cascading failures, and location of measurement devices. Graph-theoretic approaches have been widely used to solve these problems, but are subject to several limitations. One of the limitations is the ability to model a heterogeneous system in a consistent manner usin...

2014
Muhammad Akram Ather Ashraf Mansoor Sarwar

Many problems of practical interest can be modeled and solved by using graph algorithms. In general, graph theory has a wide range of applications in diverse fields. In this paper, the intuitionistic fuzzy organizational and neural network models, intuitionistic fuzzy neurons in medical diagnosis, intuitionistic fuzzy digraphs in vulnerability assessment of gas pipeline networks, and intuitioni...

2010
Vecdi Aytac Tufan Turaci

The fundamental component of a distributed system is the interconnection network. The network topology is significant since the communication between processors is derived via message exchange in distributed systems. Graph can be used for modeling the interconnection network. In case, by using combinatorics and graph theory, the properties of a network can be recognized. There have been studies...

2006
Namho Yoo Hyeong-Ah Choi

This paper suggests a SOA-based system impact management for information assurance vulnerability in E-Government. Once an information assurance vulnerability notice is given for a system, it is important for reducing massive system engineering efforts for system impact management. When multiple systems are updated by security patches for mitigating system vulnerability, system impact management...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید