Quantitative evaluation of vulnerability exploitability in network information systems

被引:0
|
作者
School of Computer Science, Civil Aviation University of China, Tianjin 300300, China [1 ]
机构
来源
Qinghua Daxue Xuebao | 2009年 / SUPPL. 2卷 / 2157-2163期
关键词
Information systems;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:2157 / 2163
相关论文
共 50 条
  • [31] An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression
    Jiang, Zhiyuan
    Feng, Chao
    Tang, Chaojing
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [32] Network Evaluation Based on Connectivity Vulnerability
    Kurauchi, Fumitaka
    Uno, Nobuhiro
    Sumalee, Agachai
    Seto, Yumiko
    TRANSPORTATION AND TRAFFIC THEORY 2009: GOLDEN JUBILEE, 2009, : 637 - +
  • [33] A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data
    Lin, Weiwei
    Yang, Chaofan
    Zhang, Zeqing
    Xue, Xingsi
    Haga, Reiko
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (12): : 4531 - 4544
  • [34] Vulnerability of Complex Network Structures and Systems
    O. D. Polishchuk
    Cybernetics and Systems Analysis, 2020, 56 : 312 - 321
  • [35] Vulnerability of Complex Network Structures and Systems
    Polishchuk, O. D.
    CYBERNETICS AND SYSTEMS ANALYSIS, 2020, 56 (02) : 312 - 321
  • [36] The use of quantitative methods in research on the evaluation of the implementation of health information systems
    Damazio, Dioni da Rosa
    Soares, Sandro Vieira
    Montenegro de Lima, Carlos Rogerio
    REVISTA DE GESTAO E SECRETARIADO-GESEC, 2020, 11 (03): : 109 - 132
  • [38] Development of the quantitative generalized information network analysis (GINA) methodology for satellite systems
    Orbital Sciences Corp, Dulles, United States
    IEEE Aerosp Appl Conf Proc, (301-321):
  • [39] A Novel Network Modeling and Evaluation Approach for Security Vulnerability Quantification in Substation Automation Systems
    Ko, Jongbin
    Lee, Seokjun
    Lim, Yong-hun
    Ju, Seong-ho
    Shon, Taeshik
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2013, E96D (09): : 2021 - 2025
  • [40] Simulation in Information Systems: Potential of the Vulnerability Theory
    Silva, Pedro Sa
    Pinto, Jorge
    Varajao, Joao
    Trigo, Antonio
    Cruz-Cunha, Maria Manuela
    Bentes, Isabel
    Varum, Humberto
    Agarwal, Jitendra
    ENTERPRISE INFORMATION SYSTEMS PT I, 2010, 109 : 219 - +