نتایج جستجو برای: network vulnerability

تعداد نتایج: 710634  

Journal: :Journal of Multimedia 2013
Xiaoling Tang

IP multimedia subsystems bring huge security threats to the IMS-based next-generation networks although they bring IMS-based network integration and business ability enhancement. Therefore, the research on the vulnerability of IP multimedia subsystems attracts widespread attention recently. In this article, the security threats of next-generation core networks are discussed first. And then we a...

2007
Martin Andersson

To test if a host contains any known security flaws over a network connection a Vulnerability Assessment (VA) could be made. This thesis describes different techniques used by VA tools over a network connection to detect known security flaws. To decrease the risk of flaws not being detected, several VA tools could be used. There is no common way of merging information from different VA tools. T...

2003
H. T. Tian L. S. Huang Z. Zhou J. L. Shan

With the continuous flood of vulnerabilities of computer systems, vulnerability management is a very important task for administrators to keep systems as secure as possible. However current manual vulnerability management by administrators is very time-consuming and error-prone. This paper proposes an open framework of automated vulnerability management that dramatically alleviates the burden o...

Journal: :CoRR 2014
Sheetal Bairwa Bhawna Mewara Jyoti Gajrani

With the increasing concern for security in the network, many approaches are laid out that try to protect the network from unauthorised access. New methods have been adopted in order to find the potential discrepancies that may damage the network. Most commonly used approach is the vulnerability assessment. By vulnerability, we mean, the potential flaws in the system that make it prone to the a...

IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...

 Abstract: The shipments of hazardous materials (HAZMATs) induce various risks to the road network. Today, one of the major considerations of transportation system managers is HAZMATs shipments, due to the increasing demand of these goods (because it is more used in industry, agriculture, medicine, etc.), and the rising number of incidents that are associated to hazardous materials. This paper ...

2009
Steven Noel Sushil Jajodia

Current network security tools generally lack sufficient context for maintaining a well informed and proactive defense posture. Vulnerabilities are usually assessed in isolation, without considering how they contribute to overall attack risk. Similarly, intrusion alarms are logged as isolated events, with limited correlation capabilities. Security professionals are overwhelmed by constant threa...

2006

The increasing potential to interconnect and combine the computational power of devices with different capabilities and purposes leads to new security issues. While security is nowadays defined as the possibility to prevent “negative things from happening”, security of the future focuses on the potential of new vulnerabilities in software being exploited due to the increased exchange of mobile ...

2012
M. Sánchez-Silva

This paper develops a methodology for seismic vulnerability assessment of power transmission systems. The analysis is carried out from the perspective of system’s form (i.e., topological importance of elements) and system’s strength (i.e., probability of failure). The form combines the electrical properties of the network (e.g., electrical distance, power flow) with the systems approach via hie...

Journal: :CoRR 2013
Chien Huynh Phuong Huynh

— The student generation nowadays is considered as the Net Generation who grow up in the age of Internet and mobile technology and prefer bringing technological application into their life. The Learning Resource Center – an academic information center-takes the initiative in developing a collaborative network with the students' participation for delivering information of natural disasters and c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید