[go: up one dir, main page]

Al-Kohlany, 2002 - Google Patents

Vulnerabilities of computer systems: a test of the VERDICT computer security taxonomy and its application to mobile ad hoc networks

Al-Kohlany, 2002

Document ID
10946645279526383590
Author
Al-Kohlany F
Publication year

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3495Performance evaluation by tracing or monitoring for systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3409Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
    • G06F11/3414Workload generation, e.g. scripts, playback
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Similar Documents

Publication Publication Date Title
Alhassan et al. Information security in an organization
Rubin et al. A survey of Web security
US20110047610A1 (en) Modular Framework for Virtualization of Identity and Authentication Processing for Multi-Factor Authentication
WO2000070463A1 (en) Apparatus and methods for analyzing multiple network security vulnerabilities
Malik et al. Federated identity management (FIM): Challenges and opportunities
Khattak et al. A study on threat model for federated identities in federated identity management system
Teo et al. Dynamic and risk-aware network access management
Adeniran et al. Vulnerability assessment studies of existing knowledge-based authentication systems: A systematic review
Syed et al. Protecting grids from cross-domain attacks using security alert sharing mechanisms
Knoll et al. Path-based security for mobile agents
Al-Kohlany Vulnerabilities of computer systems: a test of the VERDICT computer security taxonomy and its application to mobile ad hoc networks
Mshangi et al. Using soft systems methodology and activity theory to exploit security of web applications against heartbleed vulnerability
Dubrawsky How to cheat at securing your network
Helmer Intelligent multi-agent system for intrusion detection and countermeasures
Lukatsky et al. Protect your information with intrusion detection
Liu Next generation SSH2 implementation: securing data in motion
Uda Vulnerable web server protection by hash based url transformation
Viegas et al. IT security technical controls
Kalil Policy Creation and Bootstrapping System for Customer Edge Switching
Kim et al. Systematic Security Guideline Framework through Intelligently Automated Vulnerability Analysis
Harrison et al. A protocol layer survey of network security
Neagu Oracle 11g Anti-hacker's Cookbook
Nitschke et al. Mobile agent security
Wyatt et al. Secure Messaging Scenarios with WebSphere MQ
Johnson Problems in computer security for commercial systems