Sciweavers

2304 search results - page 2 / 461
» On the Vulnerability of Large Graphs
Sort
View
ICSE
2012
IEEE-ACM
11 years 7 months ago
A large scale exploratory analysis of software vulnerability life cycles
Abstract—Software systems inherently contain vulnerabilities that have been exploited in the past resulting in significant revenue losses. The study of vulnerability life cycles...
Muhammad Shahzad, Muhammad Zubair Shafiq, Alex X. ...
DIMVA
2004
13 years 6 months ago
Foundations for Intrusion Prevention
: We propose an infrastructure that helps a system administrator to identify a newly published vulnerability on the site hosts and to evaluate the vulnerability's threat with ...
Shai Rubin, Ian D. Alderman, David W. Parter, Mary...
ISW
2009
Springer
13 years 11 months ago
Towards Unifying Vulnerability Information for Attack Graph Construction
Sebastian Roschke, Feng Cheng 0002, Robert Schuppe...
IPPS
2007
IEEE
13 years 11 months ago
Security Threat Prediction in a Local Area Network Using Statistical Model
In today’s large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulner...
Somak Bhattacharya, S. K. Ghosh
HICSS
2008
IEEE
90views Biometrics» more  HICSS 2008»
13 years 11 months ago
Power System Extreme Event Detection: The Vulnerability Frontier
In this work we apply graph theoretic tools to provide a close bound on a frontier relating the number of line outages in a grid to the power disrupted by the outages. This fronti...
Bernard C. Lesieutre, Ali Pinar, Sandip Roy