메뉴 건너뛰기




Volumn 27, Issue 3-4, 2008, Pages 71-83

Standardising vulnerability categories

Author keywords

Artificial intelligence; Common vulnerabilities and exposures (CVE) list; Data clustering; Self organising map (SOM); Vulnerability; Vulnerability scanners (VSs)

Indexed keywords

ARTIFICIAL INTELLIGENCE; SCANNING; SPECTRUM ANALYZERS; STANDARDS;

EID: 49849085708     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2008.04.002     Document Type: Article
Times cited : (17)

References (18)
  • 2
    • 49849101374 scopus 로고    scopus 로고
    • Baker DW, Christey SM, Hill WH, Mann DE. The development of a common enumeration of vulnerabilities and exposures. In: Second international workshop on recent advances in intrusion detection; 1999.
    • Baker DW, Christey SM, Hill WH, Mann DE. The development of a common enumeration of vulnerabilities and exposures. In: Second international workshop on recent advances in intrusion detection; 1999.
  • 3
    • 0003411763 scopus 로고
    • Technical Report CSE-9510, Department of Computer Science, University of California, Davis
    • Bishop M. A taxonomy of UNIX system and network vulnerabilities. Technical Report CSE-9510 (1995), Department of Computer Science, University of California, Davis
    • (1995) A taxonomy of UNIX system and network vulnerabilities
    • Bishop, M.1
  • 8
    • 0034863225 scopus 로고    scopus 로고
    • Kirk JS, Chang DJ, Zurada JM. A self-organizing map with dynamic architecture for efficient color quantization. In: Proceedings of the international joint conference on neural networks, Washington, D.C.; 2001.
    • Kirk JS, Chang DJ, Zurada JM. A self-organizing map with dynamic architecture for efficient color quantization. In: Proceedings of the international joint conference on neural networks, Washington, D.C.; 2001.
  • 12
    • 49849098956 scopus 로고    scopus 로고
    • Li YL, Venter HS, Eloff JHP. Categorizing vulnerabilities using data clustering techniques. In: Proceedings of ISSA conference; June 2004, ISBN: 1-86854-522-9.
    • Li YL, Venter HS, Eloff JHP. Categorizing vulnerabilities using data clustering techniques. In: Proceedings of ISSA conference; June 2004, ISBN: 1-86854-522-9.
  • 14
    • 49849090303 scopus 로고    scopus 로고
    • Available from:
    • MITRE Inc. Available from: (January 2008).
    • (2008)
    • MITRE, Inc.1
  • 15
    • 49849087356 scopus 로고    scopus 로고
    • Available from:
    • MOREnet. Available from: (January 2008).
    • (2008)
    • MOREnet1
  • 16
    • 49849102800 scopus 로고    scopus 로고
    • Available from:
    • SAINT Corporation. Available from: (January 2008).
    • (2008)
    • SAINT Corporation1
  • 17
    • 49849105342 scopus 로고    scopus 로고
    • Available from:
    • SFProtect. Available from: (07 October 2006).
    • (2006)
    • SFProtect1
  • 18
    • 4544256778 scopus 로고    scopus 로고
    • Harmonising vulnerability categories
    • 1015-7999 Computer Society of South Africa
    • Venter H.S., and Eloff J.H.P. Harmonising vulnerability categories. South African Computer Journal, 1015-7999 29 (2002) 24-31 Computer Society of South Africa
    • (2002) South African Computer Journal , vol.29 , pp. 24-31
    • Venter, H.S.1    Eloff, J.H.P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.