-
2
-
-
84857363169
-
Network vulnerability assessment management
-
Mandy Andress Network vulnerability assessment management Network World 2004
-
(2004)
Network World
-
-
Andress, M.1
-
4
-
-
84857356862
-
-
Beyond Security AVDS 2011 http://www.beyondsecurity.com/
-
(2011)
AVDS
-
-
Security, B.1
-
7
-
-
84857363172
-
-
Critical Watch FusionVM 2011 http://www.criticalwatch.com/products/ vulnerability-management-overview.aspx
-
(2011)
FusionVM
-
-
Watch, C.1
-
11
-
-
51449121189
-
Building a test suite for web application scanners
-
IEEE
-
E. Fong, R. Gaucher, V. Okun, and P.E. Black Building a test suite for web application scanners Hawaii International Conference on System Sciences, Proceedings of the 41st Annual 2008 IEEE 478
-
(2008)
Hawaii International Conference on System Sciences, Proceedings of the 41st Annual
, pp. 478
-
-
Fong, E.1
Gaucher, R.2
Okun, V.3
Black, P.E.4
-
13
-
-
84857357356
-
-
GFI GFI LANguard 2011 http://www.gfi.se/lannetscan/
-
(2011)
GFI GFI LANguard
-
-
-
16
-
-
77950793246
-
Modeling modern network attacks and countermeasures using attack graphs
-
IEEE
-
K. Ingols, M. Chu, R. Lippmann, S. Webster, and S. Boyer Modeling modern network attacks and countermeasures using attack graphs 2009 Annual Computer Security Applications Conference 2009 IEEE 117 126
-
(2009)
2009 Annual Computer Security Applications Conference
, pp. 117-126
-
-
Ingols, K.1
Chu, M.2
Lippmann, R.3
Webster, S.4
Boyer, S.5
-
19
-
-
32344452166
-
A comparative study of anomaly detection schemes in network intrusion detection
-
A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, and J. Srivastava A comparative study of anomaly detection schemes in network intrusion detection Proceedings of the Third SIAM International Conference on Data Mining 2003 25 36
-
(2003)
Proceedings of the Third SIAM International Conference on Data Mining
, pp. 25-36
-
-
Lazarevic, A.1
Ertoz, L.2
Kumar, V.3
Ozgur, A.4
Srivastava, J.5
-
20
-
-
84857367220
-
-
Lumension Patchlink scan 2011 http://www.lumension.com/vulnerability- management.jsp
-
(2011)
Lumension Patchlink Scan
-
-
-
23
-
-
78650721199
-
Virtualization performance: Perspectives and challenges ahead
-
R. McDougall, and J. Anderson Virtualization performance: perspectives and challenges ahead ACM SIGOPS Operating Systems Review 44 4 2010 40 56
-
(2010)
ACM SIGOPS Operating Systems Review
, vol.44
, Issue.4
, pp. 40-56
-
-
McDougall, R.1
Anderson, J.2
-
25
-
-
84857367221
-
-
nCircle nCircle IP360 2011 http://www.ncircle.com/index.php?s=products- ccm
-
(2011)
Ncircle NCircle IP360
-
-
-
29
-
-
84857363174
-
-
Rapid7 NeXpose 2011 http://www.rapid7.com/nexpose/uvm.jsp
-
(2011)
Rapid7 NeXpose
-
-
-
30
-
-
84857367758
-
-
Saint corporation
-
Saint corporation SAINT 2011 http://www.saintcorporation.com/products/ software/saintScanner.html
-
(2011)
SAINT
-
-
-
33
-
-
84857367219
-
Vulnerability assessment
-
Stephenson Peter Vulnerability assessment SC Magazine 2010 http://www.scmagazineus.com/vulnerability-assessment/grouptest/203/
-
(2010)
SC Magazine
-
-
Peter, S.1
-
34
-
-
81855207571
-
-
Still Secure ProtectPoint 2011 http://www.stillsecure.com/services/ vulnerability-management.php
-
(2011)
ProtectPoint
-
-
Secure, S.1
-
35
-
-
84857363177
-
-
Symantec SecureFusion portal 2011 http://www.gideontechnologies.com/ SecureFusion-portal.asp
-
(2011)
Symantec SecureFusion Portal
-
-
-
36
-
-
84857363176
-
-
Tenable Nessus 2011 http://www.nessus.org/nessus/
-
(2011)
Tenable Nessus
-
-
-
37
-
-
84857367992
-
-
Trustwave Trustwave 2011 https://www.trustwave.com/vulnerabilityScanning. php
-
(2011)
Trustwave Trustwave
-
-
-
38
-
-
77953302052
-
The impact of virtualization on network performance of amazon ec2 data center
-
IEEE
-
G. Wang, and T.S.E. Ng The impact of virtualization on network performance of amazon ec2 data center INFOCOM, 2010 Proceedings IEEE 2010 IEEE 1 9
-
(2010)
INFOCOM, 2010 Proceedings IEEE
, pp. 1-9
-
-
Wang, G.1
Ng, T.S.E.2
-
42
-
-
78149306475
-
Analyzing and modeling the performance in xen-based virtual cluster environment
-
IEEE
-
K. Ye, X. Jiang, S. Chen, D. Huang, and B. Wang Analyzing and modeling the performance in xen-based virtual cluster environment 12th IEEE International Conference on High Performance Computing and Communications (HPCC) 2010 IEEE 273 280
-
(2010)
12th IEEE International Conference on High Performance Computing and Communications (HPCC)
, pp. 273-280
-
-
Ye, K.1
Jiang, X.2
Chen, S.3
Huang, D.4
Wang, B.5
|