Integrated quantitative assessment of mainstream operating systems' security vulnerabilities

被引:0
|
作者
Research Center of Information Intelligent and Information Security, Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080, China [1 ]
不详 [2 ]
机构
来源
Gaojishu Tongxin | 2007年 / 4卷 / 331-336期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Internet of Things (IoT): Application Systems and Security Vulnerabilities
    Ahamed, Jinesh
    Rajan, Amala V.
    2016 5TH INTERNATIONAL CONFERENCE ON ELECTRONIC DEVICES, SYSTEMS AND APPLICATIONS (ICEDSA), 2016,
  • [32] Architectural Solutions to Mitigate Security Vulnerabilities in Software Systems
    Anand, Priya
    Ryoo, Jungwoo
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [33] Understanding Software Security Vulnerabilities in Cloud Server Systems
    Tunde-Onadele, Olufogorehan
    Lin, Yuhang
    Gu, Xiaohui
    He, Jingzhu
    2022 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2022), 2022, : 245 - 252
  • [34] Security of Cyber Physical Systems: Vulnerabilities, Attacks and Countermeasure
    Alrefaei, Faisal
    Alzahrani, Abdullah
    Song, Houbing
    Zohdy, Mohamed
    2020 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS 2020), 2020, : 551 - 556
  • [35] ITOSS - AN INTEGRATED TOOLKIT FOR OPERATING SYSTEM SECURITY
    RABIN, M
    TYGAR, JD
    LECTURE NOTES IN COMPUTER SCIENCE, 1989, 367 : 2 - 15
  • [36] Tracking Known Security Vulnerabilities in Proprietary Software Systems
    Cadariu, Mircea
    Bouwers, Eric
    Visser, Joost
    van Deursen, Arie
    2015 22ND INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), 2015, : 516 - 519
  • [37] Security analysis of vulnerabilities and threats for medical information systems
    Ju, Tea Kyung
    Hong, Chong Min
    Shin, Weon
    ICIC Express Letters, 2015, 9 (03): : 849 - 854
  • [38] A SURVEY OF SECURITY IN ROBOTIC SYSTEMS: VULNERABILITIES, ATTACKS, AND SOLUTIONS
    Archibald, Christopher
    Schwalm, Luke
    Ball, John E.
    INTERNATIONAL JOURNAL OF ROBOTICS & AUTOMATION, 2017, 32 (02): : 151 - 157
  • [39] ASSESSMENT OF SECURITY OF OPERATING ELECTRIC-POWER SYSTEMS USING PROBABILITY METHODS
    PATTON, AD
    PROCEEDINGS OF THE IEEE, 1974, 62 (07) : 892 - 901
  • [40] Embedded Systems Security: Threats, Vulnerabilities, and Attack Taxonomy
    Papp, Dorottya
    Ma, Zhendong
    Buttyan, Levente
    2015 THIRTEENTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2015, : 145 - 152