메뉴 건너뛰기




Volumn 13, Issue 2, 2005, Pages 156-166

An automated framework for managing security vulnerabilities

Author keywords

Data security; Risk management; Security products

Indexed keywords

AUTOMATION; CLIENT SERVER COMPUTER SYSTEMS; COMPUTER SOFTWARE; INFORMATION TECHNOLOGY; INTERNET; RISK MANAGEMENT;

EID: 18244372167     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220510589334     Document Type: Article
Times cited : (13)

References (9)
  • 1
    • 0242283056 scopus 로고    scopus 로고
    • "Addressing internet security vulnerabilities: A benchmarking study"
    • Ghonaimy, M.A., El-Hadidi, M.T. and Aslan, H.K. (Eds), Kluwer Academic Publishers, Boston, MA
    • Alayed, A., Furnell, S.M. and Barlow, I.M. (2002), "Addressing internet security vulnerabilities: A benchmarking study", in Ghonaimy, M.A., El-Hadidi, M.T. and Aslan, H.K. (Eds), Security in the Information Society: Visions and Perspectives, Kluwer Academic Publishers, Boston, MA, pp. 121-32.
    • (2002) Security in the Information Society: Visions and Perspectives , pp. 121-132
    • Alayed, A.1    Furnell, S.M.2    Barlow, I.M.3
  • 2
    • 18244381990 scopus 로고    scopus 로고
    • CERT, CERT Coordination Centre, Pittsburgh, PA, available at: www.cert.org/stats/cert_stats.html
    • CERT (2004), CERT Statistics 1988-2004, CERT Coordination Centre, Pittsburgh, PA, available at: www.cert.org/stats/cert_stats.html
    • (2004) CERT Statistics 1988-2004
  • 3
    • 18244386905 scopus 로고    scopus 로고
    • eEye, eEye-Digital Security, Aliso Viejo, CA, available at: www.eeye.com/html/assets/pdf/retina_whitepaper.pdf
    • eEye (2001), Retina: The Network Security Scanner, eEye-Digital Security, Aliso Viejo, CA, available at: www.eeye.com/html/assets/pdf/ retina_whitepaper.pdf
    • (2001) Retina: The Network Security Scanner
  • 4
    • 0002706942 scopus 로고    scopus 로고
    • "Vulnerability assessment scanners: Detection result"
    • 8 January, available at: www.networkcomputing.com/1201/1201f1b1. html
    • Forristal, J. and Shipley, G. (2001), "Vulnerability assessment scanners: Detection result", Network Computing, 8 January, available at: www.networkcomputing.com/1201/1201f1b1.html
    • (2001) Network Computing
    • Forristal, J.1    Shipley, G.2
  • 6
    • 18244372623 scopus 로고    scopus 로고
    • "Users face five years of patching pain as security flaws keep rising"
    • 5 October
    • Goodwin, B. (2004), "Users face five years of patching pain as security flaws keep rising", Computer Weekly, 5 October, pp. 1-4.
    • (2004) Computer Weekly , pp. 1-4
    • Goodwin, B.1
  • 7
    • 18244380497 scopus 로고    scopus 로고
    • "Microsoft Strategic Technology Protection Program"
    • Microsoft Corporation, 2 July available at: www.microsoft.com/security/ mstpp.asp
    • Microsoft Corporation (2003), "Microsoft Strategic Technology Protection Program", 2 July, available at: www.microsoft.com/ security/mstpp.asp
    • (2003)
  • 8
    • 18244365042 scopus 로고    scopus 로고
    • "SANS ®ISK: The consensus security alert"
    • SANS Institute, Available in: www.sans.org/newsletters/risk/
    • SANS Institute (2004), "SANS ®ISK: The consensus security alert", available at: www.sans.org/newsletters/risk/
    • (2004)
  • 9
    • 18244391650 scopus 로고    scopus 로고
    • "Symantec internet security threat report"
    • Symantec, Symantec, September, available at:
    • Symantec (2004), "Symantec internet security threat report", Volumes I-VI, Symantec, September, available at: http://enterprisesecurity.symantec.com/content.cfm?articleid=1539
    • (2004) , vol.1-6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.