Sciweavers

495 search results - page 2 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
118
Voted
SAC
2002
ACM
15 years 23 days ago
Collaborative attack modeling
Avoidance and discovery of security vulnerabilities in information systems requires awareness of typical risks and a good understanding of vulnerabilities and their exploitations....
Jan Steffan, Markus Schumacher
78
Voted
ISSRE
2008
IEEE
15 years 7 months ago
Vulnerability Discovery Modeling Using Weibull Distribution
HyunChul Joh, Jinyoo Kim, Yashwant K. Malaiya
134
Voted
DSN
2003
IEEE
15 years 6 months ago
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities
This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) m...
Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishanka...
119
Voted
FLAIRS
2001
15 years 2 months ago
Views: Fundamental Building Blocks in the Process of Knowledge Discovery
We present a novel approach to describe the knowledge discovery process, focusing on a generalized form of attribute called view. It is observed that the process of knowledge disc...
Hideo Bannai, Yoshinori Tamada, Osamu Maruyama, Ke...
108
Voted
ER
2009
Springer
166views Database» more  ER 2009»
15 years 7 months ago
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
Golnaz Elahi, Eric S. K. Yu, Nicola Zannone