<--- Back to Details
First PageDocument Content
Computer security / Computer network security / Vulnerability / Software testing / Vulnerability database / National Vulnerability Database / Zero-day / CVSS / Common Vulnerabilities and Exposures / Attack / Buffer overflow / Social vulnerability
Date: 2013-01-18 09:24:08
Computer security
Computer network security
Vulnerability
Software testing
Vulnerability database
National Vulnerability Database
Zero-day
CVSS
Common Vulnerabilities and Exposures
Attack
Buffer overflow
Social vulnerability

SOFTWARE – PRACTICE AND EXPERIENCE Softw. Pract. ExperPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: spe.2180 Analysis of operating system diversity for intrusion tolerance Mig

Add to Reading List

Source URL: www.di.fc.ul.pt

Download Document from Source Website

File Size: 932,36 KB

Share Document on Facebook

Similar Documents

Journal of Communications Vol. 10, No. 2, FebruaryASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data Tao Wen1, Yuqing Zhang1,2, Qianru Wu2, and Gang Ya

Journal of Communications Vol. 10, No. 2, FebruaryASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data Tao Wen1, Yuqing Zhang1,2, Qianru Wu2, and Gang Ya

DocID: 1quHb - View Document

Architectural Analysis for Security (AAFS)

Architectural Analysis for Security (AAFS)

DocID: 1qpdp - View Document

PDF Document

DocID: 1pSl7 - View Document

PDF Document

DocID: 1pwU6 - View Document

NIST SPRevision 3, The Technical Specification for SCAP Version 1.3

NIST SPRevision 3, The Technical Specification for SCAP Version 1.3

DocID: 1puNg - View Document