نتایج جستجو برای: network vulnerability

تعداد نتایج: 710634  

2012

As network components grow larger and more diverse, and as securing them on a host-by-host basis grow more difficult, more sites are turning to a network security model. We concentrate on controlling network access to various hosts and the services they offer, rather than on securing them one by one with a network security model. We present how the policy rules from vulnerabilities stored in SV...

2005
Hamid Reza Shahriari Reza Sadoddin Rasool Jalili Reza Zakeri Ali Reza Omidian

Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a fact, exploiting most of vulnerabilities result in access rights alteration. In this paper, we propose a new vulnerability analysis method based on the Take-Grant protection model. We extend the initial TakeGrant model...

Journal: :Internet Mathematics 2015
Aron Laszka Assane Gueye

Technological networks (e.g. telephone and sensor networks, Internet) have provided modern society with increased efficiency, but have also exposed us to the risks posed by their vulnerability to attacks. Mitigating these risks involves designing robust network topologies in situations where resources are economically constrained. In this paper, we consider the vulnerability of network topologi...

سادات میرایی, نفیسه, علی اکبری, اسماعیل,

Urban planning has to perform seismic pathology of urban streets in seismic cities. Streets and roads are the most important spaces and urban elements in the cities which should be considered not only in space occupation and connecting spaces and urban activities but also in seismic vulnerability and on this basis it is planned to reduce environmental hazards and on top of earthquake-related. M...

2007
Ahmed M.A. Haidar Azah Mohamed Aini Hussain

Vulnerability assessment in power systems is important so as to determine how vulnerable a power system in case of any unforeseen catastrophic events. This paper presents the application of Radial Basis Function Neural Network (RBFNN) for vulnerability assessment of power system incorporating a new proposed feature extraction method named as the Neural Network Weight Extraction (NNWE) for dimen...

2005
Frédéric Massicotte Mathieu Couture Yvan Labiche

Intrusion Detection Systems (IDS) use different techniques to reduce the number of false positives they generate. Simple network context information such as the communication session state has been added in IDS signatures to only raise alarms in the proper context. However, this is often not sufficient and more network context information needs to be added to these Stateful IDS (SIDS) signature...

Journal: :Chaos 2007
Stefano Boccaletti Javier Buldú Regino Criado Julio Flores Vito Latora Javier Pello Miguel Romance

We present a novel approach to quantify the vulnerability of a complex network, i.e., the capacity of a graph to maintain its functional performance under random damages or malicious attacks. The proposed measure represents a multiscale evaluation of vulnerability, and makes use of combined powers of the links' betweenness. We show that the proposed approach is able to properly describe some ca...

2015

Proactive Vulnerability Assessments with Nessus The goal of this paper is to illustrate the benefits of deploying Nessus as a low-cost vulnerability scanner as a supplement to an existing security model. I'll discuss vulnerability scanning in general, what Nessus is all about, how to begin scanning your network, and finally why a vulnerability scanner is an essential component of an effective s...

Ashtiyani , R., Jahani , A., Rezaei Anvar , M.,

Aims: Reducing the city's vulnerability in times of crisis and emergencies is part of the urban design mission. Hence, passive defense measures have been developed to reduce the vulnerability of cities in times of crisis. The purpose of this study was to identify the factors affecting passive defense in the performance of urban spaces in the area of Enghelab Square in Tehran. Methodology: This ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید