نتایج جستجو برای: graph vulnerability
تعداد نتایج: 239961 فیلتر نتایج به سال:
52 Computer Windows of Vulnerability: A Case Study Analysis C omplex information and communication systems give rise to design, implementation, and management errors. These errors can lead to a vulnerability—a flaw in an information technology product that could allow violations of security policy. Anecdotal evidence alone suggests that known and patchable vulnerabilities cause the majority of ...
Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a bilevel mixed integer nonlinear programming problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original ...
Growing cybersecurity risks in the power grid require that utilities implement a variety of security mechanism (SM) composed mostly of VPNs, firewalls, or other custom security components. While they provide some protection, they might contain software vulnerabilities which can lead to a cyber-attack. In this paper, the severity of a cyber-attack has been decreased by employing a diverse set of...
Modeling and analyzing information system vulnerabilities help predict possible attacks to computer networks using vulnerabilities information and the network configuration. In this paper, we propose a comprehensive approach to analyze network vulnerabilities in order to answer the safety problem focusing on vulnerabilities. The approach which is called Vulnerability Take Grant (VTG) is a graph...
Cloud Security is one amongst most significant problems that have attracted plenty of analysis and development effort in past few years. Notably, attackers will explore vulnerabilities of a cloud system and compromise virtual machines to deploy additional large-scale Distributed Denial-of-Service (DDoS). DDoS attacks sometimes involve early stage actions like multi-step exploitation, low freque...
background: the safety of rehabilitation centers is of great importance to ensure the well-being of patients. the present study aimed to determine non-structural and functional vulnerability of state rehabilitation centers of tehran city welfare organization in disasters using national standard instruments in 2014. materials and methods: this study has a descriptive and cross-sectional design. ...
Vulnerability assessment in industrial IoT networks is critical due to the evolving nature of domain and increasing complexity security threats. This study aims address existing gaps literature by conducting a comprehensive survey on use attack graphs for vulnerability networks. Attack serve as valuable cybersecurity tool modeling analyzing potential scenarios systems, networks, or applications...
The evaluation of network risk is a vital task. Nevertheless, there‘s no approach for looking both the severity of the vulnerabilities and the general status of network security. It can not handle with uncertainty occurred in the process of evaluation. This paper proposes a practical approach named HTV to solve the upper two problems. First, an algorithm using the Bayes Theorem is designed to c...
Studies of the fault-tolerance of graphs have tended to largely concentrate on classical graph connectivity. This measure is very basic, and conveys very little information for designers to use in selecting a suitable topology for the interconnection network in embedded systems. In this paper, we study the vulnerability of interconnection networks to the failure of individual links, using a set...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید