Identifying Potentially-Impacted Area by Vulnerabilities in Networked Systems Using CVSS
暂无分享,去创建一个
Eiji Okamoto | Masahiko Kato | Akira Kanaoka | Toshiki Harada | E. Okamoto | Akira Kanaoka | Toshiki Harada | Masahiko Kato
[1] Stephen Tyree,et al. Strata-Gem: risk assessment through mission modeling , 2008, QoP '08.
[2] Marco Domenico Aime,et al. AMBRA: automated model-based risk analysis , 2007, QoP '07.
[3] Yeu-Pong Lai,et al. Using the vulnerability information of computer systems to improve the network security , 2007, Comput. Commun..
[4] Karen Scarfone,et al. Vulnerability scoring for security configuration settings , 2008, QoP '08.
[5] Eiji Okamoto,et al. Extraction of Parameters from Well Managed Networked System in Access Control , 2009, 2009 Fourth International Conference on Internet Monitoring and Protection.