<--- Back to Details
First PageDocument Content
Security / Cyberwarfare / Computer security / Computer network security / Hacking / Vulnerability / Risk / Common Weakness Enumeration / Vulnerability database / CVSS / National Vulnerability Database / Cross-site scripting
Date: 2015-03-08 23:14:44
Security
Cyberwarfare
Computer security
Computer network security
Hacking
Vulnerability
Risk
Common Weakness Enumeration
Vulnerability database
CVSS
National Vulnerability Database
Cross-site scripting

Journal of Communications Vol. 10, No. 2, FebruaryASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data Tao Wen1, Yuqing Zhang1,2, Qianru Wu2, and Gang Ya

Add to Reading List

Source URL: www.jocm.us

Download Document from Source Website

File Size: 1,38 MB

Share Document on Facebook

Similar Documents

Journal of Communications Vol. 10, No. 2, FebruaryASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data Tao Wen1, Yuqing Zhang1,2, Qianru Wu2, and Gang Ya

Journal of Communications Vol. 10, No. 2, FebruaryASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data Tao Wen1, Yuqing Zhang1,2, Qianru Wu2, and Gang Ya

DocID: 1quHb - View Document

PDF Document

DocID: 1pSl7 - View Document

PDF Document

DocID: 1pwU6 - View Document

NIST SPRevision 3, The Technical Specification for SCAP Version 1.3

NIST SPRevision 3, The Technical Specification for SCAP Version 1.3

DocID: 1puNg - View Document

SOFTWARE – PRACTICE AND EXPERIENCE Softw. Pract. ExperPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: spe.2180 Analysis of operating system diversity for intrusion tolerance Mig

SOFTWARE – PRACTICE AND EXPERIENCE Softw. Pract. ExperPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: spe.2180 Analysis of operating system diversity for intrusion tolerance Mig

DocID: 1lTNK - View Document