نتایج جستجو برای: vulnerability detection

تعداد نتایج: 606748  

2013
O. B. Lawal O. B. Longe

Information Systems and Networks are subject to electronic attacks. Attempts to breach information security are rising every day, along with the availability of the Vulnerability Assessment tools that are widely available on the internet, for free, as well as for a commercial use. Tools such as SubSeven, BackOrifce, Nmaps, L0ftCrack, can all be used to scan, identify, probe, and penetrate syste...

Journal: :RFC 2008
Robert Sparks Scott D. Lawrence Alan Hawrylyshen Byron Campen

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. license-info) in effect on the date of pu...

Journal: :Computer Communications 2007
Dimitris Geneiatakis Costas Lambrinoudakis

Voice over IP (VoIP) services based on the Session Initiation Protocol (SIP) gain ground as compared to other protocols like MGCP or H.323. However, the open SIP architecture constitutes the provided services vulnerable to various attacks, similar to those currently existing in Internet. The lack of a formal way to describe VoIP vulnerabilities hinders the development of tools that could be uti...

2001
Martin Hiller Arshad Jhumka Neeraj Suri

We present a novel approach for analysing the propagation of data errors in software. The concept of error permeability is introduced as a basic measure upon which we define a set of related measures. These measures guide us in the process of analysing the vulnerability of software to find the modules that are most likely exposed to propagating errors. Based on the analysis performed with error...

Journal: :J. Internet Serv. Inf. Secur. 2011
Wissam Mallouli Amel Mammar Ana R. Cavalli Willy Jimenez

Dynamic code analysis attempts to find errors or vulnerabilities while a program is executing on a real or virtual processor. The objective of dynamic analysis is to reduce debugging time by automatically pinpointing and informing on errors as they occur. The use of dynamic analysis tools can reduce the need for the developer to recreate the precise conditions under which an error, a vulnerabil...

2009
Cyrille Bertelle Antoine Dutot Michel Nabaa Damien Olivier Phillipe Lebon Pascal Mallet

The utilization of the road network by vehicles with different behaviors can generate a danger under normal and especially under evacuation situations. In Le Havre agglomeration (CODAH), there are 33 establishments classified SEVESO with high threshold. The modeling and assessment of the danger is useful when it intersects with the exposed stakes. The most important factor is people. In the lit...

Journal: :IJCNIS 2009
Aline Lopes da Silva Zair Abdelouahab Denivaldo Lopes

Recently, mobile devices and wireless networks are more common for supporting human activities providing mobility and flexibility. Mobile devices inside a wireless environment contribute to make easily accessible and available the information. However, wireless environment is susceptible to vulnerabilities due to information which is propagated through the air and thus exposed to interception o...

2001
J. F. Baldwin T. P. Martin J. M. Rossiter

In this paper we present a simple belief updating system using recurrent fuzzy rules which improves class prediction in ordered datasets. The recurrent fuzzy rule builds up belief in a class for each point in a sample-ordered or timeordered dataset. Belief in each class is represented by a fuzzy set predicted class defined on the class universe. Belief in a class increases as positive cases are...

Most networks without fixed infrastructure are based on cloud computing face various challenges. In recent years, different methods have been used to distribute software defined network to address these challenges. This technology, while having many capabilities, faces some vulnerabilities in the face of some common threats and destructive factors such as distributed Denial of Service. A review...

2017
Muhammad Noman khalid Muhammad Iqbal Muhammad Talha Alam Vishal Jain Hira Mirza

The internet has provided a vast range of benefits to society, and empowering people in a variety of ways. Due to incredible growth of Internet usage in past 2 decades, everyday a number of new Web applications are also becoming a part of World Wide Web. The distributed and open nature of internet attracts hackers to interrupt the smooth services of web applications. Some of the famous web appl...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید