Al-Kohlany, 2002 - Google Patents
Vulnerabilities of computer systems: a test of the VERDICT computer security taxonomy and its application to mobile ad hoc networksAl-Kohlany, 2002
- Document ID
- 10946645279526383590
- Author
- Al-Kohlany F
- Publication year
External Links
- 238000004458 analytical method 0 abstract description 28
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3495—Performance evaluation by tracing or monitoring for systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3409—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
- G06F11/3414—Workload generation, e.g. scripts, playback
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Alhassan et al. | Information security in an organization | |
| Rubin et al. | A survey of Web security | |
| US20110047610A1 (en) | Modular Framework for Virtualization of Identity and Authentication Processing for Multi-Factor Authentication | |
| WO2000070463A1 (en) | Apparatus and methods for analyzing multiple network security vulnerabilities | |
| Malik et al. | Federated identity management (FIM): Challenges and opportunities | |
| Khattak et al. | A study on threat model for federated identities in federated identity management system | |
| Teo et al. | Dynamic and risk-aware network access management | |
| Adeniran et al. | Vulnerability assessment studies of existing knowledge-based authentication systems: A systematic review | |
| Syed et al. | Protecting grids from cross-domain attacks using security alert sharing mechanisms | |
| Knoll et al. | Path-based security for mobile agents | |
| Al-Kohlany | Vulnerabilities of computer systems: a test of the VERDICT computer security taxonomy and its application to mobile ad hoc networks | |
| Mshangi et al. | Using soft systems methodology and activity theory to exploit security of web applications against heartbleed vulnerability | |
| Dubrawsky | How to cheat at securing your network | |
| Helmer | Intelligent multi-agent system for intrusion detection and countermeasures | |
| Lukatsky et al. | Protect your information with intrusion detection | |
| Liu | Next generation SSH2 implementation: securing data in motion | |
| Uda | Vulnerable web server protection by hash based url transformation | |
| Viegas et al. | IT security technical controls | |
| Kalil | Policy Creation and Bootstrapping System for Customer Edge Switching | |
| Kim et al. | Systematic Security Guideline Framework through Intelligently Automated Vulnerability Analysis | |
| Harrison et al. | A protocol layer survey of network security | |
| Neagu | Oracle 11g Anti-hacker's Cookbook | |
| Nitschke et al. | Mobile agent security | |
| Wyatt et al. | Secure Messaging Scenarios with WebSphere MQ | |
| Johnson | Problems in computer security for commercial systems |