نتایج جستجو برای: network vulnerability
تعداد نتایج: 710634 فیلتر نتایج به سال:
BACKGROUND The focus of management in many complex systems is shifting towards facilitation, adaptation, building resilience, and reducing vulnerability. Resilience management requires the development and application of general heuristics and methods for tracking changes in both resilience and vulnerability. We explored the emergence of vulnerability in the South African domestic ostrich indust...
Network security situation awareness is vital important for network security supervision. In order to obtain the network security situation effectively, a multidimensional assessment method is proposed in this paper. The method is composed of three dimensions at different levels, namely vulnerability, threat and basic operation, with quantitative calculation method for each index. In the servic...
Data security has become a major issue in most network protocols. For wireless system, security support is even more important to protect the users as well as the network. Due to this importance, different protocol were designed & deployed with network standards in order to add the security. The security sub layer of IEEE 802.16 employs an authenticated client/server key management protocol in ...
Quantitative and qualitative monitoring and evaluation of risk management programs will play an important role in the development of Tehran metropolitan railway transport. Considering the tectonic studies, seismic zones, land degradation and faults in north and south of Tehran, the development of underground railway lines, the assessment of the vulnerability of subway stations and the escalatio...
The safety of people and the security of the vital functions of society are among the core tasks of governments. Various networks, especially transportation networks, are important for human life. Much research has been done to analyse the vulnerability of road networks and most of the methods were based on analysing the topological structure of the network using graph theory. For instance, Dem...
Quantifying security risk is an important and yet difficult task in enterprise network risk management, critical for proactive mission assurance. Even though metrics exist for individual vulnerabilities, there is currently no standard way of aggregating such metrics. We developed a quantitative model that can be used to aggregate vulnerability metrics in an enterprise network, with a sound comp...
In this article, a modeling process is defined to address challenges in analyzing attack scenarios and mitigating vulnerabilities in networked environments. Known system vulnerability data, system configuration data, and vulnerability scanner results are considered to create exploitation graphs (e-graphs) that are used to represent attack scenarios. Experiments carried out in a cluster computin...
We study the strategic interaction between a network manager whose goal is to choose (as communication infrastructure) a spanning tree of a network given as an undirected graph, and an attacker who is capable of attacking a link in the network. We model their interaction as a zero-sum game and discuss a particular set of Nash equilibria. More specifically, we show that there always exists a Nas...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید