نتایج جستجو برای: graph vulnerability
تعداد نتایج: 239961 فیلتر نتایج به سال:
Nowadays attacks are becoming increasingly frequent and sophisticated, and they are also becoming increasingly interconnected. Recent works in network security have demostrated the fact that combinations of vulnerability exploits are the typical means by which an attacker can break into a network. It is therefore in great need of performing vulnerability analysis to do security analysis first a...
Abstract: The most widely used and well-known vulnerability measures of a connected graph are based on the neighbourhood concept. It takes into account neighbour-integrity, edge-integrity and accessibility number. In this work we define and examine common-neighbourhood of a connected graph as a new global connectivity measure. Our measure examines the neighbourhoods of all pairs of vertices of ...
The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in an understandable way. Several algorithms exist for this purpose which use attack graphs to model the ways in which attacks can be combined. These algorithms can be classified in to two broad categories namely scenari...
The goal is to build a general framework for ad hoc applications over large networks using semantics and complex systems analysis. The first part deals with semantics because applications need to be described. Ontologies are used to achieve it. They systematize application knowledge in a graph. Sometimes, the amount of information can be huge, in other words, the graph could be a large network....
Modeling power transmission networks is an important area of research with applications such as vulnerability analysis, study of cascading failures, and location of measurement devices. Graph-theoretic approaches have been widely used to solve these problems, but are subject to several limitations. One of the limitations is the ability to model a heterogeneous system in a consistent manner usin...
Many problems of practical interest can be modeled and solved by using graph algorithms. In general, graph theory has a wide range of applications in diverse fields. In this paper, the intuitionistic fuzzy organizational and neural network models, intuitionistic fuzzy neurons in medical diagnosis, intuitionistic fuzzy digraphs in vulnerability assessment of gas pipeline networks, and intuitioni...
The fundamental component of a distributed system is the interconnection network. The network topology is significant since the communication between processors is derived via message exchange in distributed systems. Graph can be used for modeling the interconnection network. In case, by using combinatorics and graph theory, the properties of a network can be recognized. There have been studies...
This paper suggests a SOA-based system impact management for information assurance vulnerability in E-Government. Once an information assurance vulnerability notice is given for a system, it is important for reducing massive system engineering efforts for system impact management. When multiple systems are updated by security patches for mitigating system vulnerability, system impact management...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید