Quantitative evaluation of vulnerability exploitability in network information systems

被引:0
|
作者
School of Computer Science, Civil Aviation University of China, Tianjin 300300, China [1 ]
机构
来源
Qinghua Daxue Xuebao | 2009年 / SUPPL. 2卷 / 2157-2163期
关键词
Information systems;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:2157 / 2163
相关论文
共 50 条
  • [1] Hierarchical Quantitative Evaluation of Vulnerability Exploitability
    Sheng Yi
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 115 - 118
  • [2] A Character-Level Convolutional Neural Network for Predicting Exploitability of Vulnerability
    Lyu, Jinghui
    Bai, Yude
    Xing, Zhenchang
    Li, Xiaohong
    Ge, Weimin
    2021 INTERNATIONAL SYMPOSIUM ON THEORETICAL ASPECTS OF SOFTWARE ENGINEERING (TASE 2021), 2021, : 119 - 126
  • [3] Binary Vulnerability Exploitability Analysis
    Tang, Feng-Yi
    Feng, Chao
    Tang, Chao-Jing
    2016 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI 2016), 2016, : 181 - 185
  • [4] A Survey on Software Vulnerability Exploitability Assessment
    Elder, Sarah
    Rahman, Md Rayhanur
    Fringer, Gage
    Kapoor, Kunal
    Williams, Laurie
    ACM COMPUTING SURVEYS, 2024, 56 (08)
  • [5] Information assurance evaluation for network information systems
    Lu, Xin
    Ma, Zhi
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1528 - 1531
  • [6] Information assurance evaluation for network information systems
    Lue, Xin
    Ma, Zhi
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 869 - +
  • [7] Quantitative evaluation of an information network in a supply chain
    Ishii, Nobuaki
    Ohba, Masaaki
    INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 2023, 261
  • [8] Using the vulnerability information of computer systems to improve the network security
    Lai, Yeu-Pong
    Hsia, Po-Lun
    COMPUTER COMMUNICATIONS, 2007, 30 (09) : 2032 - 2047
  • [9] Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits
    Suciu, Octavian
    Nelson, Connor
    Lyu, Zhuoer
    Bao, Tiffany
    Dumitras, Tudor
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 377 - 394
  • [10] Quantitative and qualitative approaches to information systems evaluation
    Irani, Zahir
    Gunasekaran, Angappa
    Love, Peter E. D.
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2006, 173 (03) : 951 - 956