Sciweavers

495 search results - page 2 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
SAC
2002
ACM
13 years 5 months ago
Collaborative attack modeling
Avoidance and discovery of security vulnerabilities in information systems requires awareness of typical risks and a good understanding of vulnerabilities and their exploitations....
Jan Steffan, Markus Schumacher
ISSRE
2008
IEEE
14 years 16 hour ago
Vulnerability Discovery Modeling Using Weibull Distribution
HyunChul Joh, Jinyoo Kim, Yashwant K. Malaiya
DSN
2003
IEEE
13 years 11 months ago
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities
This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) m...
Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishanka...
FLAIRS
2001
13 years 7 months ago
Views: Fundamental Building Blocks in the Process of Knowledge Discovery
We present a novel approach to describe the knowledge discovery process, focusing on a generalized form of attribute called view. It is observed that the process of knowledge disc...
Hideo Bannai, Yoshinori Tamada, Osamu Maruyama, Ke...
ER
2009
Springer
166views Database» more  ER 2009»
14 years 5 days ago
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
Golnaz Elahi, Eric S. K. Yu, Nicola Zannone