Vulnerability management models using a common vulnerability scoring system
M Walkowski, J Oko, S Sujecki - Applied Sciences, 2021 - mdpi.com
Featured Application The Vulnerability Management Center allows for the improvement of
the quality and efficiency of operation for security operation centers. Abstract Vulnerability …
the quality and efficiency of operation for security operation centers. Abstract Vulnerability …
Automated context-aware vulnerability risk management for patch prioritization
The information-security landscape continuously evolves by discovering new vulnerabilities
daily and sophisticated exploit tools. Vulnerability risk management (VRM) is the most …
daily and sophisticated exploit tools. Vulnerability risk management (VRM) is the most …
Logs2Vul: Vulnerability Detection from Logs for CSPM
O Jois, G Roshni, R Baisak… - … on Advances in …, 2024 - ieeexplore.ieee.org
Cloud Security Posture Management (CSPM) is gaining importance with the increase in the
adoption of multicloud environments. CSPM focuses not only on visualization and …
adoption of multicloud environments. CSPM focuses not only on visualization and …
Automated Patch Management: An Empirical Evaluation Study
Vulnerability patch management is one of IT orga-nizations' most complex issues due to the
increasing number of publicly known vulnerabilities and explicit patch deadlines for …
increasing number of publicly known vulnerabilities and explicit patch deadlines for …
Towards Automated Identification and Assessment of Security Weaknesses in Smart Buildings
HTE Vargas - 2022 - research.utwente.nl
Smart buildings are equipped with computer systems that monitor and control diverse
services such as air conditioning, indoor transportation, physical access control, and many …
services such as air conditioning, indoor transportation, physical access control, and many …
Environmentally aware vulnerability prioritisation within large networks: A proposed novel method
M Lenander, J Tigerström - 2022 - diva-portal.org
Background. Software vulnerabilities are a constant threat to organisations, businesses, and
individuals. Keeping all devices patched from security software vulnerabilities is complex …
individuals. Keeping all devices patched from security software vulnerabilities is complex …