Sciweavers

1548 search results - page 8 / 310
» Estimating Software Vulnerabilities
Sort
View
CISSE
2008
Springer
14 years 11 months ago
Game Theoretic Approach for Discovering Vulnerable Links in Complex Networks
Mishkovski Igor, Sonja Filiposka, Sasho Gramatikov...
SICHERHEIT
2010
14 years 7 months ago
Amun: Automatic Capturing of Malicious Software
: This paper describes the low-interaction server honeypot Amun. Through the use of emulated vulnerabilities Amun aims at capturing malware in an automated fashion. The use of the ...
Jan Göbel
TR
2008
98views more  TR 2008»
14 years 9 months ago
Application of Vulnerability Discovery Models to Major Operating Systems
A number of security vulnerabilities have been reported in the Windows, and Linux operating systems. Both the developers, and users of operating systems have to utilize significant...
Omar H. Alhazmi, Yashwant K. Malaiya