نتایج جستجو برای: graph vulnerability

تعداد نتایج: 239961  

Journal: :Journal of Computer Security 2010
James R. Conrad Jim Alves-Foss Sauchi Stephen Lee

We introduce TG/MC, a Monte-Carlo approach for evaluating the impact of uncertainty about vulnerabilities upon forecasts of security for a real-world system modeled by a protection graph. A TG/MC model defines a vulnerability as a potential change to an otherwise safe initial protection graph that, if exploited, leads to an unauthorized state, a violation of the system’s security policy through...

Journal: :IEEE Access 2022

Graph burning is a process to determine the spreading of information in graph. If sequence vertices burns all graph by following process, then such known as sequence. The problem consists finding minimum length for given solution this NP-hard combinatorial optimization helps quantify graph’s vulnerability contagion. This paper introduces simple farthest-first traversal-based approximatio...

2009
Cyrille Bertelle Antoine Dutot Michel Nabaa Damien Olivier Phillipe Lebon Pascal Mallet

The utilization of the road network by vehicles with different behaviors can generate a danger under normal and especially under evacuation situations. In Le Havre agglomeration (CODAH), there are 33 establishments classified SEVESO with high threshold. The modeling and assessment of the danger is useful when it intersects with the exposed stakes. The most important factor is people. In the lit...

2011
Ricardo Gutiérrez Francisco del-Pozo Stefano Boccaletti

A measure to quantify vulnerability under perturbations (attacks, failures, large fluctuations) in ensembles (networks) of coupled dynamical systems is proposed. Rather than addressing the issue of how the network properties change upon removal of elements of the graph (the strategy followed by most of the existing methods for studying the vulnerability of a network based on its topology), here...

2006
R. Minciardi R. Sacile E. Trasforini

The effects of natural hazards can be mitigated by the use of proper “pre-event” interventions on “key” elements of the territory, that is on elements that are mostly vulnerable to a given catastrophic scenario and whose loss of functionality can cause damages on people, property and environment. In this respect, methodologies and tools should be studied to support decision makers in the analys...

2012
Mahdi Abadi Saeed Jalili

As computer networks continue to grow, it becomes increasingly more important to automate the process of evaluating their vulnerability to attacks. Despite the best efforts of software architects and developers, network hosts inevitably contain a number of vulnerabilities. Hence, it is not feasible for a network administrator to remove all vulnerabilities present in the network hosts. Therefore...

2006
PETER MELL

example, should they first address a vulnerability with a severity of “5” or one with a severity of “high”? The Common Vulnerability Scoring System (CVSS) is a public initiative designed to address this issue by presenting a framework for assessing and quantifying the impact of software vulnerabilities. Organizations currently generating CVSS scores include Cisco, US National Institute of Stand...

Journal: :Journal of Universal Computer Science 2022

Disassembly is the basis of static analysis binary code and used in malicious detection, vulnerability mining, software optimization, etc. arbitrary suspicious blocks (e.g., for traffic packets intercepted by network) a difficult task. Traditional disassembly methods require manual specification starting address cannot automate blocks. In this paper, we propose method based on extension selecti...

2013
Jiyong Jang Maverick Woo David Brumley

Software lineage refers to the evolutionary relationship among a collection of software. The goal of software lineage inference is to recover the lineage given a set of program binaries. Software lineage can provide extremely useful information in many security scenarios such as malware triage and software vulnerability tracking. In this paper, we systematically study software lineage inference...

2011
Su Zhang Xinming Ou Anoop Singhal John Homer

Quantifying security risk is an important and yet difficult task in enterprise network risk management, critical for proactive mission assurance. Even though metrics exist for individual vulnerabilities, there is currently no standard way of aggregating such metrics. We developed a quantitative model that can be used to aggregate vulnerability metrics in an enterprise network, with a sound comp...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید