A vulnerability risk assessment method based on heterogeneous information network
W Wang, F Shi, M Zhang, C Xu, J Zheng - IEEE Access, 2020 - ieeexplore.ieee.org
Due to the increasing number of network security vulnerabilities, vulnerability risk
assessment must be performed to prioritize the repair of high-risk vulnerabilities. Traditional …
assessment must be performed to prioritize the repair of high-risk vulnerabilities. Traditional …
Cuckoo's malware threat scoring and classification: Friend or foe?
Malware threat classification involves understanding the behavior of the malicious software
and how it affects a victim host system. Classifying threats allows for measured response …
and how it affects a victim host system. Classifying threats allows for measured response …
Hardening saml by integrating sso and multi-factor authentication (mfa) in the cloud
Even though the cloud paradigm and its associated services has been adopted in various
enterprise applications, there has been major issues with regard to authenticating users' …
enterprise applications, there has been major issues with regard to authenticating users' …
Mobile health application security assesment based on owasp top 10 mobile vulnerabilities
DF Priambodo, GS Ajie, HA Rahman… - 2022 International …, 2022 - ieeexplore.ieee.org
The increase of smartphone users in Indonesia is the reason for various sectors to improve
their services through mobile applications, including the healthcare sector. The healthcare …
their services through mobile applications, including the healthcare sector. The healthcare …
Research on network risk evaluation method based on a differential manifold
X Zhao, Y Zhang, J Xue, C Shan, Z Liu - IEEE Access, 2020 - ieeexplore.ieee.org
With the rapid development of networks, network security is a serious problem. To evaluate
a network accurately, this paper proposes a network risk evaluation method based on a …
a network accurately, this paper proposes a network risk evaluation method based on a …
CVSS-based vulnerability and risk assessment for high performance computing networks
JK Debnath, D Xie - 2022 IEEE International Systems …, 2022 - ieeexplore.ieee.org
Common Vulnerability Scoring System (CVSS) is intended to capture the key characteristics
of a vulnerability and correspondingly produce a numerical score to indicate the severity …
of a vulnerability and correspondingly produce a numerical score to indicate the severity …
Conceptual model for crowd-sourcing digital forensic evidence
COVID-19 scourge has made it challenging to combat digital crimes due to the complexity of
attributing potential security incidents to perpetrators. Existing literature does not accurately …
attributing potential security incidents to perpetrators. Existing literature does not accurately …
Forensic profiling of cyber-security adversaries based on incident similarity measures interaction index
In today's complex cyber space, forecasting the likelihood or probability that a Cyber
Security Adversary (CSA) is likely to attack a given infrastructure, system or a networked …
Security Adversary (CSA) is likely to attack a given infrastructure, system or a networked …
WAPI Protocol Security Performance Evaluation
F Sun, H Wen, Y Zhu, X Xu - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Due to wireless LAN is closed to our daily life and our terminals, the malicious attack actions
are easily to be launched to the open wireless broadcast channel. WAPI (Wireless LAN …
are easily to be launched to the open wireless broadcast channel. WAPI (Wireless LAN …
Cyber security threat awareness framework for high school students in Qatar
M Al-Tajer, RA Ikuesan - arXiv preprint arXiv:2207.00820, 2022 - arxiv.org
Cyber security is considered a necessity for anyone in todays modern world. Awareness of
cyber security standards and best practices have become mandatory to safeguard ones …
cyber security standards and best practices have become mandatory to safeguard ones …