نتایج جستجو برای: graph vulnerability

تعداد نتایج: 239961  

Journal: :Future Generation Computer Systems 2023

Software vulnerabilities can pose severe harms to a computing system. They lead system crash, privacy leakage, or even physical damage. Correctly identifying among enormous software codes in timely manner is so far the essential prerequisite patch them. Unfortantely, current vulnerability identification methods, either classic ones deep-learning-based ones, have several critical drawbacks, maki...

2016

Today’s organizations are inherently open and connected, sharing knowledge and ideas in order to remain innovative. As a result, these organizations are also more vulnerable to information theft through different forms of security breaches caused by hackers and competitors. One way of understanding the vulnerability of an information system is to build and analyze the attack graph of that syste...

Journal: :international journal of agricultural management and development 2013
mojtaba sookhtanlo hesamedin gholami seyyed reza es’haghi

identification and analysis of farmers’ vulnerability associated with their risk aversion degree is one of the necessary requirements for planning and reducing impacts of drought in iran. so, this study was investigated three risk vulnerability parameters (economic, social and technical) among wheat farmers categorized in accordance with their risk aversion degree in the mashhad county (iran) b...

Journal: :IEICE Transactions on Information and Systems 2023

Constructing accurate similarity graph is an important process in graph-based clustering. However, traditional methods have three drawbacks, such as the inaccuracy of graph, vulnerability to noise and outliers, need for additional discretization process. In order eliminate these limitations, entropy regularized unsupervised clustering based on maximum correntropy criterion adaptive neighbors (E...

Journal: :journal of algebra and related topics 2015
a. sharma a. gaur

let $r$ be a commutative ring with identity. let $g(r)$ denote the maximal graph associated to $r$, i.e., $g(r)$ is a graph with vertices as the elements of $r$, where two distinct vertices $a$ and $b$ are adjacent if and only if there is a maximal ideal of $r$ containing both. let $gamma(r)$ denote the restriction of $g(r)$ to non-unit elements of $r$. in this paper we study the various graphi...

2008
Steven Noel Sushil Jajodia

We describe the optimal placement of intrusion detection system (IDS) sensors and prioritization of IDS alarms, using attack graph analysis. Our attack graphs predict the various possible ways of penetrating a network to reach critical assets. In particular, automated analysis of network configuration and attacker exploits provides an attack graph showing all possible paths to critical assets. ...

2008
Dara Moazzami Behzad Salehian B. Salehian

The edge-tenacity Te(G) of a graph G was defined as Te(G) = min F⊂E(G) {| F | +τ(G− F ) ω(G− F ) } where the minimum is taken over all edge cutset F of G. We define G-F to be the graph induced by the edges of E(G) − F , τ(G − F ) is the number of edges in the largest component of the graph induced by G-F and ω(G−F ) is the number of components of G− F . A set F ⊂ E(G) is said to be a Te-set of ...

2012
Will Scott Raymond Cheng Arvind Krishnamurthy Thomas Anderson

The desire for uncensored access to the Internet has motivated the development of both open proxies like Tor and social graph-based overlays like FreeNet. However, neither design is sufficient, as relays in open proxies are easily exposed and blocked, and overlays based just on social trust suffer from poor availability and performance. In this paper, we introduce the design for a new overlay s...

Journal: :Int. J. Comput. Math. 2005
Yinkui Li Shenggui Zhang Xueliang Li

We introduce a new graph parameter, the rupture degree. The rupture degree for a complete graph Kn is defined as 1 − n, and the rupture degree for an incomplete connected graph G is defined by r(G) = max{ω(G − X)− |X| − m(G − X) : X ⊂ V(G),ω(G − X) > 1}, where ω(G − X) is the number of components of G − X and m(G − X) is the order of a largest component of G − X . It is shown that this paramete...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید