Sciweavers

885 search results - page 1 / 177
» Using the vulnerability information of computer systems to i...
Sort
View
COMCOM
2007
100views more  COMCOM 2007»
13 years 4 months ago
Using the vulnerability information of computer systems to improve the network security
In these years, the security problem becomes more important to everyone using computers. However, vulnerabilities on computers are found so frequently that system managers can not...
Yeu-Pong Lai, Po-Lun Hsia
IAW
2003
IEEE
13 years 9 months ago
Security Vulnerabilities in Command and Control Interoperability
- This paper will outline issues associated with communication system interoperability, the security vulnerabilities associated with improved interoperability, network simulation t...
John A. Hamilton Jr.
COMPSAC
2008
IEEE
13 years 10 months ago
Measuring Network Security Using Bayesian Network-Based Attack Graphs
Given the increasing dependence of our societies on information systems, the overall security of these systems should be measured and improved. Existing work generally focuses on ...
Marcel Frigault, Lingyu Wang
DSN
2009
IEEE
13 years 11 months ago
Xprobe2++: Low volume remote network information gathering tool
Active operating system fingerprinting is the process of actively determining a target network system’s underlying operating system type and characteristics by probing the targ...
Fedor V. Yarochkin, Ofir Arkin, Meder Kydyraliev, ...
CCS
2008
ACM
13 years 6 months ago
Measuring network security using dynamic bayesian network
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics...
Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushi...