نتایج جستجو برای: network vulnerability

تعداد نتایج: 710634  

2007
Alvaro A. Cárdenas Tanya Roosta Shankar Sastry

In recent years we have witnessed the emergence and establishment of research in sensor network security. The majority of the literature has focused on discovering numerous vulnerabilities and attacks against sensor networks, along with suggestions for corresponding countermeasures. However, there has been little guidance for understanding the holistic nature of sensor network security for prac...

2007
Tim Chenoweth Robert P. Minch Sharon Tabor

This research in progress essay reviews the existing technology acceptance literature to evaluate its ability to predict the adoption of network security controls. We suggest that an expanded view of current technology acceptance theory may be required to adequately address the complex variables that influence the acceptance of security controls. An important differentiator is that while tradit...

2017

Vulnerability assessment is an effective security mechanism to identify vulnerabilities in systems or networks before they are exploited. However manual analysis of network testing and vulnerability assessment results is time consuming and demands expertise. This paper presents an improvement of Analia, which is a security system to process results obtained after a vulnerability assessment usin...

2017

Vulnerability assessment is an effective security mechanism to identify vulnerabilities in systems or networks before they are exploited. However manual analysis of network testing and vulnerability assessment results is time consuming and demands expertise. This paper presents an improvement of Analia, which is a security system to process results obtained after a vulnerability assessment usin...

Journal: :جغرافیا و مخاطرات محیطی 0
ابوالفضل قنبری محمد علی سالکی ملکی معصومه قاسمی

1. introduction zakeri gary (1750) found that earthquake is jolts of some places or significant portions of land to natural causes with big voices like thunder that is often accompanied by an eruption of water, fire, smog or wind. after the earthquake, building efficiency greatly reduces because of the network’s collapse and closing of paths. however, after a catastrophic disaster, communicatio...

2012
Fengwei Li

The tenacity of an incomplete connected graph G is defined as T (G) = min{ |S|+m(G−S) ω(G−S) : S ⊂ V (G), ω(G− S) > 1}, where ω(G− S) and m(G− S), respectively, denote the number of components and the order of a largest component inG−S. This is a reasonable parameter to measure the vulnerability of networks, as it takes into account both the amount of work done to damage the network and how bad...

2004
Marcus Kaiser Claus C. Hilgetag

Biological networks, such as cellular metabolic pathways or networks of corticocortical connections in the brain, are intricately organized, yet remarkably robust toward structural damage. Whereas many studies have investigated specific aspects of robustness, such as molecular mechanisms of repair, this article focuses more generally on how local structural features in networksmay give rise to ...

2011
Sophia Alim Ruqayya Abdulrahman Daniel Neagu Mick Ridley

The increase in social computing has provided the situation where large amounts of personal information are being posted online. This makes people vulnerable to social engineering attacks because their personal details are readily available. Our automated approach for personal data extraction was developed to extract personal details and top friends from MySpace profiles and place them into a r...

Journal: :Information Systems Frontiers 2008
Xiuzhen Chen Qinghua Zheng Xiaohong Guan

Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the security vulnerabilities. However, current vulnerability assessment methods may encounter the issues of high false positive rates, long computational time, and requirement of developing attack codes. Moreover, they are only capab...

Journal: :Microprocessors and Microsystems - Embedded Hardware Design 1998
Stefanos Gritzalis Diomidis Spinellis

The Cascade Vulnerability Problem is a potential problem which must be faced when using the interconnected accredited system approach of the Trusted Network Interpretation. It belongs to a subset of the problem set that addresses the issue of whether the interconnection of secure systems via a secure channel results in a secure distributed system. The Cascade Vulnerability problem appears when ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید