نتایج جستجو برای: graph vulnerability

تعداد نتایج: 239961  

Journal: :IEEE Computer 2000
William A. Arbaugh William L. Fithen John McHugh

52 Computer Windows of Vulnerability: A Case Study Analysis C omplex information and communication systems give rise to design, implementation, and management errors. These errors can lead to a vulnerability—a flaw in an information technology product that could allow violations of security policy. Anecdotal evidence alone suggests that known and patchable vulnerabilities cause the majority of ...

Journal: :SIAM Journal on Optimization 2010
Ali Pinar Juan C. Meza Vaibhav Donde Bernard C. Lesieutre

Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a bilevel mixed integer nonlinear programming problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original ...

Journal: :CoRR 2018
Md Touhiduzzaman Adam Hahn Anurag Srivastava

Growing cybersecurity risks in the power grid require that utilities implement a variety of security mechanism (SM) composed mostly of VPNs, firewalls, or other custom security components. While they provide some protection, they might contain software vulnerabilities which can lead to a cyber-attack. In this paper, the severity of a cyber-attack has been decreased by employing a diverse set of...

Journal: :Computers & Security 2007
Hamid Reza Shahriari Rasool Jalili

Modeling and analyzing information system vulnerabilities help predict possible attacks to computer networks using vulnerabilities information and the network configuration. In this paper, we propose a comprehensive approach to analyze network vulnerabilities in order to answer the safety problem focusing on vulnerabilities. The approach which is called Vulnerability Take Grant (VTG) is a graph...

2014
C. Kavitha

Cloud Security is one amongst most significant problems that have attracted plenty of analysis and development effort in past few years. Notably, attackers will explore vulnerabilities of a cloud system and compromise virtual machines to deploy additional large-scale Distributed Denial-of-Service (DDoS). DDoS attacks sometimes involve early stage actions like multi-step exploitation, low freque...

Journal: :health in emergencies and disasters quarterly 0
mohammad ali hosseini department of rehab management, university of social welfare & rehabilitation sciences, tehran, iran. golnush mirzayi department of rehabmanagement, university of social welfare & rehabilitation sciences, kodakyar ave., daneshjoo blvd., evin, tehran, iran. seyed habibollah kovari department of rehab management, university of social welfare & rehabilitation sciences, tehran, iran. hamid reza khankeh department of nursing, university of social welfare & rehabilitation sciences, tehran, iran. saeed hosseini teshnizi clinical research development center of children hospital, hormozgan university of medical sciences, bandar abbas, iran.

background: the safety of rehabilitation centers is of great importance to ensure the well-being of patients. the present study aimed to determine non-structural and functional vulnerability of state rehabilitation centers of tehran city welfare organization in disasters using national standard instruments in 2014. materials and methods: this study has a descriptive and cross-sectional design. ...

Journal: :IEEE Access 2023

Vulnerability assessment in industrial IoT networks is critical due to the evolving nature of domain and increasing complexity security threats. This study aims address existing gaps literature by conducting a comprehensive survey on use attack graphs for vulnerability networks. Attack serve as valuable cybersecurity tool modeling analyzing potential scenarios systems, networks, or applications...

2015
Wang Hui

The evaluation of network risk is a vital task. Nevertheless, there‘s no approach for looking both the severity of the vulnerabilities and the general status of network security. It can not handle with uncertainty occurred in the process of evaluation. This paper proposes a practical approach named HTV to solve the upper two problems. First, an algorithm using the Bayes Theorem is designed to c...

1998
Vijay Lakamraju Zahava Koren Israel Koren C. Mani Krishna

Studies of the fault-tolerance of graphs have tended to largely concentrate on classical graph connectivity. This measure is very basic, and conveys very little information for designers to use in selecting a suitable topology for the interconnection network in embedded systems. In this paper, we study the vulnerability of interconnection networks to the failure of individual links, using a set...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید