<--- Back to Details
First PageDocument Content
Security / Cyberwarfare / Computer security / Computer network security / Hacking / Vulnerability / Risk / Common Weakness Enumeration / Vulnerability database / CVSS / National Vulnerability Database / Cross-site scripting
Date: 2015-03-08 23:14:44
Security
Cyberwarfare
Computer security
Computer network security
Hacking
Vulnerability
Risk
Common Weakness Enumeration
Vulnerability database
CVSS
National Vulnerability Database
Cross-site scripting

Journal of Communications Vol. 10, No. 2, FebruaryASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data Tao Wen1, Yuqing Zhang1,2, Qianru Wu2, and Gang Ya

Add to Reading List

Source URL: www.jocm.us

Download Document from Source Website

File Size: 1,38 MB

Share Document on Facebook

Similar Documents

1  Software Vulnerability Disclosure in Europe: Summary and Key Highlights of the European Parliament

1 Software Vulnerability Disclosure in Europe: Summary and Key Highlights of the European Parliament

DocID: 1xVza - View Document

What is a Vulnerability Disclosure Policy and Why You Need One VDPs work and they protect assets. That’s why the U.S. Department of Justice, the European Commission, and the U.S. Food & Drug Administration recommend th

What is a Vulnerability Disclosure Policy and Why You Need One VDPs work and they protect assets. That’s why the U.S. Department of Justice, the European Commission, and the U.S. Food & Drug Administration recommend th

DocID: 1xVfx - View Document

Physical Attack Vulnerability of Hash-Based Signature Schemes Verwundbarkeit von Hash-basierten Signaturverfahren durch Physikalische Angriffe Master-Thesis von Matthias Julius Kannwischer Tag der Einreichung:

Physical Attack Vulnerability of Hash-Based Signature Schemes Verwundbarkeit von Hash-basierten Signaturverfahren durch Physikalische Angriffe Master-Thesis von Matthias Julius Kannwischer Tag der Einreichung:

DocID: 1xUxi - View Document

DIMVA Dear Prospective Sponsor. Since 2004 and 2009 the annual international IT-Security conferences DIMVA (Detection of Intrusions and Malware & Vulnerability Assessment) and ESSOS (Engineering Secure Software and Syste

DIMVA Dear Prospective Sponsor. Since 2004 and 2009 the annual international IT-Security conferences DIMVA (Detection of Intrusions and Malware & Vulnerability Assessment) and ESSOS (Engineering Secure Software and Syste

DocID: 1xUky - View Document

Automated Vulnerability Analysis of AC State Estimation under Constrained False Data Injection in Electric Power Systems Sicun Gao1 , Le Xie2 , Armando Solar-Lezama1 , Dimitrios Serpanos3 , and Howard Shrobe1 Abstract—

Automated Vulnerability Analysis of AC State Estimation under Constrained False Data Injection in Electric Power Systems Sicun Gao1 , Le Xie2 , Armando Solar-Lezama1 , Dimitrios Serpanos3 , and Howard Shrobe1 Abstract—

DocID: 1xU8c - View Document