V-Digger: An Efficient and Secure Vulnerability Assessment for Large-Scale ISP Network
Vulnerability assessment allows cyber security professionals to discover vulnerable end
devices. Generally, in such a process one extracts the default Service Banner (SB) from the …
devices. Generally, in such a process one extracts the default Service Banner (SB) from the …
[PDF][PDF] SIP vulnerability scan framework
The purpose of this paper is to provide a framework for detecting vulnerabilities in SIP
(Session Initiation Protocol) networks. We focused our studies on the detection of SIP DoS …
(Session Initiation Protocol) networks. We focused our studies on the detection of SIP DoS …
Vulnerability dataset construction methods applied to vulnerability detection: A survey
Y Lin, Y Li, M Gu, H Sun, Q Yue, J Hu… - 2022 52nd Annual …, 2022 - ieeexplore.ieee.org
The increasing number of security vulnerabilities has become an important problem that
needs to be solved urgently in the field of software security, which means that the current …
needs to be solved urgently in the field of software security, which means that the current …
AVAIN-a Framework for Automated Vulnerability Indication for the IoT in IP-based Networks
With the rapidly increasing number of IoT-devices and their extensive integration into
people's daily lives, the security of those devices is of primary importance. To achieve early …
people's daily lives, the security of those devices is of primary importance. To achieve early …
Modular Vulnerability Indication for the IoT in IP-Based Networks
With the rapidly increasing number of Internet of Things (IoT) devices and their extensive
integration into peoples' daily lives, the security of those devices is of primary importance …
integration into peoples' daily lives, the security of those devices is of primary importance …
Penetration testing in a box
L Epling, B Hinkel, Y Hu - Proceedings of the 2015 information security …, 2015 - dl.acm.org
Network and application vulnerability assessments have a tendency to be difficult and costly;
however, failing to have an assessment done and fixing security loopholes may result in a …
however, failing to have an assessment done and fixing security loopholes may result in a …
Network monitoring and enumerating vulnerabilities in large heterogeneous networks
In this paper, we present an empirical study on vulnerability enumeration in computer
networks using common network probing and monitoring tools. We conducted active …
networks using common network probing and monitoring tools. We conducted active …
Towards application classification with vulnerability signatures for IDS/IPS
Dhiren, Maulik, H Joshi, BK Patel - … Conference on Security of Internet of …, 2012 - dl.acm.org
In today's interconnected networks, Intrusion Detection Systems (IDSs), encryption devices
and firewalls and crucial in providing a complete security solution. A recent survey has …
and firewalls and crucial in providing a complete security solution. A recent survey has …
Catch me if you can: An in-depth study of CVE discovery time and inconsistencies for managing risks in critical infrastructures
Industrial Control Systems (ICS) are central to the operation of critical national infrastructure
(CNI) such as oil and gas, water treatment, power generation and transport systems …
(CNI) such as oil and gas, water treatment, power generation and transport systems …
Vulnerability scanning
S Pandey, A Chaudhary - Authorea Preprints, 2023 - techrxiv.org
The commercial value of web applications has significantly increased in recent years. They
progressed from simple information-sharing platforms to more sophisticated business …
progressed from simple information-sharing platforms to more sophisticated business …