نتایج جستجو برای: network vulnerability

تعداد نتایج: 710634  

2014
Christine Moore Graeme S. Cumming Jasper Slingsby John Grewar

BACKGROUND The focus of management in many complex systems is shifting towards facilitation, adaptation, building resilience, and reducing vulnerability. Resilience management requires the development and application of general heuristics and methods for tracking changes in both resilience and vulnerability. We explored the emergence of vulnerability in the South African domestic ostrich indust...

2016
Lina Zhu Guoen Xia Zuochang Zhang Jianhua Li Renjie Zhou

Network security situation awareness is vital important for network security supervision. In order to obtain the network security situation effectively, a multidimensional assessment method is proposed in this paper. The method is composed of three dimensions at different levels, namely vulnerability, threat and basic operation, with quantitative calculation method for each index. In the servic...

2010
Muhammad Ibrahim Khan Mir Md. Saki Kowsar

Data security has become a major issue in most network protocols. For wireless system, security support is even more important to protect the users as well as the network. Due to this importance, different protocol were designed & deployed with network standards in order to add the security. The security sub layer of IEEE 802.16 employs an authenticated client/server key management protocol in ...

Quantitative and qualitative monitoring and evaluation of risk management programs will play an important role in the development of Tehran metropolitan railway transport. Considering the tectonic studies, seismic zones, land degradation and faults in north and south of Tehran, the development of underground railway lines, the assessment of the vulnerability of subway stations and the escalatio...

2010
K. Virrantaus

The safety of people and the security of the vital functions of society are among the core tasks of governments. Various networks, especially transportation networks, are important for human life. Much research has been done to analyse the vulnerability of road networks and most of the methods were based on analysing the topological structure of the network using graph theory. For instance, Dem...

2011
Su Zhang Xinming Ou Anoop Singhal John Homer

Quantifying security risk is an important and yet difficult task in enterprise network risk management, critical for proactive mission assurance. Even though metrics exist for individual vulnerabilities, there is currently no standard way of aggregating such metrics. We developed a quantitative model that can be used to aggregate vulnerability metrics in an enterprise network, with a sound comp...

Journal: :Simulation 2006
Wei Li Rayford B. Vaughn Yoginder S. Dandass

In this article, a modeling process is defined to address challenges in analyzing attack scenarios and mitigating vulnerabilities in networked environments. Known system vulnerability data, system configuration data, and vulnerability scanner results are considered to create exploitation graphs (e-graphs) that are used to represent attack scenarios. Experiments carried out in a cluster computin...

2010
Assane Gueye Jean C. Walrand Venkat Anantharam

We study the strategic interaction between a network manager whose goal is to choose (as communication infrastructure) a spanning tree of a network given as an undirected graph, and an attacker who is capable of attacking a link in the network. We model their interaction as a zero-sum game and discuss a particular set of Nash equilibria. More specifically, we show that there always exists a Nas...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید