메뉴 건너뛰기




Volumn 8, Issue 4, 2003, Pages 45-55

Measuring vulnerabilities and their exploitation cycle

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SYSTEM FIREWALLS; COMPUTER VIRUSES; CYBERNETICS; HIERARCHICAL SYSTEMS; INFORMATION TECHNOLOGY; PROBLEM SOLVING; SECURITY OF DATA;

EID: 1942473630     PISSN: 13634127     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1363-4127(03)00006-2     Document Type: Article
Times cited : (9)

References (35)
  • 1
    • 0038687692 scopus 로고    scopus 로고
    • Scalable, Graph-Based Network Vulnerability Analysis
    • Ammann P., Wijesekera D., et al. Scalable, Graph-Based Network Vulnerability Analysis. Computer & Communication Security. 18:(22):2002;217-224.
    • (2002) Computer & Communication Security , vol.18 , Issue.22 , pp. 217-224
    • Ammann, P.1    Wijesekera, D.2
  • 4
    • 0034809109 scopus 로고    scopus 로고
    • Organised Crime Goes Cyber
    • Bequai A. Organised Crime Goes Cyber. Computers & Security. 20:(6):2001;475-478.
    • (2001) Computers & Security , vol.20 , Issue.6 , pp. 475-478
    • Bequai, A.1
  • 10
    • 1942457553 scopus 로고    scopus 로고
    • Information Security Assessment: Procedures & Methodology
    • Forte D. Information Security Assessment: Procedures & Methodology. Computer Fraud & Security. 2000:(8):2000;9-12.
    • (2000) Computer Fraud & Security , vol.2000 , Issue.8 , pp. 9-12
    • Forte, D.1
  • 12
    • 0034920733 scopus 로고    scopus 로고
    • Cyberthreats: Perceptions, Reality and Protection
    • Hinda S. (2001). Cyberthreats: Perceptions, Reality and Protection, Computers & Security 20(5):364-371
    • (2001) Computers & Security , vol.20 , Issue.5 , pp. 364-371
    • Hinda, S.1
  • 13
    • 1942489978 scopus 로고    scopus 로고
    • Hacking: Motivation & deterence, Part 1
    • Hoath P., Mulhall T. Hacking: motivation & deterence, part 1. Computer Fraud & Security. 1998:(4):1998;16-19.
    • (1998) Computer Fraud & Security , vol.1998 , Issue.4 , pp. 16-19
    • Hoath, P.1    Mulhall, T.2
  • 20
    • 0038749024 scopus 로고    scopus 로고
    • USA: John Wiley & Sons
    • Merris R. Graph Theory. 31:2001;171-175 John Wiley & Sons, USA.
    • (2001) Graph Theory , pp. 171-175
    • Merris, R.1
  • 26
    • 1942425801 scopus 로고    scopus 로고
    • New perspective on computer hackers
    • Rees F. New perspective on computer hackers. Computer Fraud & Security. 1996:(6):1996;8.
    • (1996) Computer Fraud & Security , vol.1996 , Issue.6 , pp. 8
    • Rees, F.1
  • 35
    • 30344458122 scopus 로고    scopus 로고
    • MIT, INRIA, Keio
    • W3C (1999). Common Markup for micropayment per-fee-links, MIT, INRIA, Keio: 1-33. www.w3.org/TR/1999/WD-Micropayment-Markup-19990825/.
    • (1999) Common Markup for Micropayment Per-fee-links , pp. 1-33


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.