نتایج جستجو برای: vulnerability analysis

تعداد نتایج: 2857032  

Journal: :IOP Conference Series: Materials Science and Engineering 2018

2011
Anshu Tripathi Umesh Kumar Singh Zhongqiang Chen Yuan Zhang Zhongrong Chen Chris Johnson

Rising vulnerability statistics demands multidimensional trend analysis for efficient threat mitigation. Understanding trends aids in early detection of problems and also in planning defense mechanisms. In this regard, this paper presents finegrained trend analysis on classified vulnerability data provided by NVD, across six CVSS base metrics. Such analysis of vulnerability data according to th...

2007
Shantaram S. Pai Vinod K. Nagpal

An effort has been initiated to integrate manufacturing process simulations with probabilistic structural analyses in order to capture the important impacts of manufacturing uncertainties on component stress levels and life. Two physics-based manufacturing process models (one for powdered metal forging and the other for annular deformation resistance welding) have been linked to the NESSUS stru...

2004
Cho Hong

Firewall is the main defence of our network and is no guarantee the present of hidden vulnerabilities. Under there is no well-defined general methodology for testing the firewalls, this is always a big headache for the administrators. Two firewall testing approaches are being compared and the correctness of the testing result is reported as well.

M. Abadi, S. Jalili,

Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...

1999
Matt Bishop

> Davis. His research areas include computer and network security, > especially analysis of vulnerabilities, building tools to detect > vulnerabilities, and ameliorating or eliminating them. >Subject Category: Vulnerabilities and Attacks > > >Extended Abstract: > >The goal of our work is to develop a methodology for detecting pre viously >unknown vulnerabilities in systems. > >We begin by argui...

2002
Jeannette M. Wing

As networks of hosts continue to grow unboundedly, evaluating their vulnerability to attack becomes increasingly more important to automate. Interconnections between hosts give rise to new global vulnerabilities, those due to unforeseen interactions between local vulnerabilities on individual hosts. An integral part of modeling the global view of network security is constructing attack graphs. ...

Journal: :IJSN 2006
Eunjin Jung Mohamed G. Gouda

A certificate system can be represented by a directed graph, called a certificate graph, where each node represents a user that has a public key and a private key and each edge (u, v) represents a certificate that is signed by the private key of u and contains the public key of v. Two types of damage can be done in a certificate graph when the private key of a node u in the graph is revealed to...

Journal: :Entropy 2017
Zhengwei Pan Juliang Jin Chunhui Li Shaowei Ning Rongxing Zhou

This paper establishes a water resources vulnerability framework based on sensitivity, natural resilience and artificial adaptation, through the analyses of the four states of the water system and its accompanying transformation processes. Furthermore, it proposes an analysis method for water resources vulnerability based on connection entropy, which extends the concept of contact entropy. An e...

2014
Umran Akin

The purpose of this study is to examine the predictive role of the self-compassion on psychological vulnerability. Participants were 281 university students (156 women, 125 men). In this study, the Self-compassion Scale and the Psychological Vulnerability Scale were used. The relationships between self-compassion and psychological vulnerability were examined using correlation analysis and multi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید