نتایج جستجو برای: graph vulnerability
تعداد نتایج: 239961 فیلتر نتایج به سال:
We introduce TG/MC, a Monte-Carlo approach for evaluating the impact of uncertainty about vulnerabilities upon forecasts of security for a real-world system modeled by a protection graph. A TG/MC model defines a vulnerability as a potential change to an otherwise safe initial protection graph that, if exploited, leads to an unauthorized state, a violation of the system’s security policy through...
Graph burning is a process to determine the spreading of information in graph. If sequence vertices burns all graph by following process, then such known as sequence. The problem consists finding minimum length for given solution this NP-hard combinatorial optimization helps quantify graph’s vulnerability contagion. This paper introduces simple farthest-first traversal-based approximatio...
The utilization of the road network by vehicles with different behaviors can generate a danger under normal and especially under evacuation situations. In Le Havre agglomeration (CODAH), there are 33 establishments classified SEVESO with high threshold. The modeling and assessment of the danger is useful when it intersects with the exposed stakes. The most important factor is people. In the lit...
A measure to quantify vulnerability under perturbations (attacks, failures, large fluctuations) in ensembles (networks) of coupled dynamical systems is proposed. Rather than addressing the issue of how the network properties change upon removal of elements of the graph (the strategy followed by most of the existing methods for studying the vulnerability of a network based on its topology), here...
The effects of natural hazards can be mitigated by the use of proper “pre-event” interventions on “key” elements of the territory, that is on elements that are mostly vulnerable to a given catastrophic scenario and whose loss of functionality can cause damages on people, property and environment. In this respect, methodologies and tools should be studied to support decision makers in the analys...
As computer networks continue to grow, it becomes increasingly more important to automate the process of evaluating their vulnerability to attacks. Despite the best efforts of software architects and developers, network hosts inevitably contain a number of vulnerabilities. Hence, it is not feasible for a network administrator to remove all vulnerabilities present in the network hosts. Therefore...
example, should they first address a vulnerability with a severity of “5” or one with a severity of “high”? The Common Vulnerability Scoring System (CVSS) is a public initiative designed to address this issue by presenting a framework for assessing and quantifying the impact of software vulnerabilities. Organizations currently generating CVSS scores include Cisco, US National Institute of Stand...
Disassembly is the basis of static analysis binary code and used in malicious detection, vulnerability mining, software optimization, etc. arbitrary suspicious blocks (e.g., for traffic packets intercepted by network) a difficult task. Traditional disassembly methods require manual specification starting address cannot automate blocks. In this paper, we propose method based on extension selecti...
Software lineage refers to the evolutionary relationship among a collection of software. The goal of software lineage inference is to recover the lineage given a set of program binaries. Software lineage can provide extremely useful information in many security scenarios such as malware triage and software vulnerability tracking. In this paper, we systematically study software lineage inference...
Quantifying security risk is an important and yet difficult task in enterprise network risk management, critical for proactive mission assurance. Even though metrics exist for individual vulnerabilities, there is currently no standard way of aggregating such metrics. We developed a quantitative model that can be used to aggregate vulnerability metrics in an enterprise network, with a sound comp...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید