Quantitative evaluation of vulnerability exploitability in network information systems

被引:0
|
作者
School of Computer Science, Civil Aviation University of China, Tianjin 300300, China [1 ]
机构
来源
Qinghua Daxue Xuebao | 2009年 / SUPPL. 2卷 / 2157-2163期
关键词
Information systems;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:2157 / 2163
相关论文
共 50 条
  • [41] Potential Use of the Theory of Vulnerability in Information Systems
    Silva, Pedro Sa
    Pinto, Jorge
    Varajao, Joao
    Trigo, Antnio
    Bentes, Isabel
    Varum, Humberto
    INFORMATION RESOURCES MANAGEMENT JOURNAL, 2012, 25 (02) : 22 - 33
  • [42] QUANTITATIVE EVALUATION OF INFORMATION AGING
    YEFIMOV, AN
    POPOVSKI.VI
    ENGINEERING CYBERNETICS, 1969, (04): : 102 - &
  • [43] VULNERABILITY EVALUATION IN ELECTRICAL POWER SYSTEMS
    Sanz, Fredy A.
    Ramirez, Juan M.
    Correa, Rosa E.
    QUID-INVESTIGACION CIENCIA Y TECNOLOGIA, 2013, (20): : 63 - 69
  • [44] Research on quantitative assessment model on vulnerability risk for information system
    Zhou, Liang
    Li, Jun-E
    Lu, Tian-Bo
    Liu, Kai-Pei
    Tongxin Xuebao/Journal on Communication, 2009, 30 (02): : 71 - 76
  • [45] Vulnerability Assessment of Shipboard Electric Power Information Network
    Yang, Han
    Ye, Zhihao
    Mei, Dan
    Xiao, Han
    PROCEEDINGS OF THE 2016 2ND WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS, 2016, 81 : 1752 - 1757
  • [46] Towards Designing Pre-trip Traveler Information Systems: A Quantitative Evaluation
    Wittek, Dorothee
    Goffart, Klaus
    Bogenberger, Klaus
    MT-ITS 2019: 2019 6TH INTERNATIONAL CONFERENCE ON MODELS AND TECHNOLOGIES FOR INTELLIGENT TRANSPORTATION SYSTEMS (MT-ITS), 2019,
  • [47] Development of a Quantitative Evaluation Method for Vehicle Control Systems Based on Road Information
    Kim, Jinyong
    Jeong, Changhyun
    Jung, Dohyun
    Kim, Byeongwoo
    ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURE INFORMATION TECHNOLOGY, VOL 2, 2016, 354 : 123 - 128
  • [48] Network Security Architecture Based on Vulnerability Evaluation
    Li, June
    Wang, Tongqing
    Zhou, Dongru
    ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 1, 2008, : 104 - 109
  • [49] Vulnerability Analysis of Network Scanning on SCADA Systems
    Coffey, Kyle
    Smith, Richard
    Maglaras, Leandros
    Janicke, Helge
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [50] Model-based quantitative method of network vulnerability analysis
    Wang, Yu-Long
    Yang, Fang-Chun
    Sun, Qi-Bo
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2008, 31 (04): : 58 - 61