Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits
Currently the problem of monitoring the security of information systems is highly relevant. One of the important security monitoring tasks is to automate the process of determination of the system weaknesses for their further elimination. The paper considers the techniques for analysis of vulnerabil...
Main Authors: | Andrey Fedorchenko, Elena Doynikova, Igor Kotenko |
---|---|
Format: | Article |
Language: | English |
Published: |
Graz University of Technology
2019-09-01
|
Series: | Journal of Universal Computer Science |
Subjects: | |
Online Access: | https://lib.jucs.org/article/22645/download/pdf/ |
Similar Items
-
Ontology and Weighted D-S Evidence Theory-Based Vulnerability Data Fusion Method
by: Xiaoling Tao, et al.
Published: (2019-03-01) -
Automated Vulnerability Discovery and Exploitation in the Internet of Things
by: Zhongru Wang, et al.
Published: (2019-07-01) -
Elevação do nível do mar no município de Vitória-ES: vulnerabilidades, impactos e possíveis ações de resposta.
by: NALI, J. O.
Published: (2018) -
A Survey of Exploitation and Detection Methods of XSS Vulnerabilities
by: Miao Liu, et al.
Published: (2019-01-01) -
From proof-of-concept to exploitable
by: Yan Wang, et al.
Published: (2019-03-01)