Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A logic-based model to support alert correlation in intrusion detection
Managing and supervising security in large networks has become a challenging task, as
new threats and flaws are being discovered on a daily basis. This requires an in depth and …
new threats and flaws are being discovered on a daily basis. This requires an in depth and …
Vulnerability assessment methods–a review
HV Nath - International Conference on Network Security and …, 2011 - Springer
This paper reviews the major contributions in the field of Vulnerability Assessment from 1990
onwards. Even well administered networks are vulnerable to attack. Vulnerabilities are …
onwards. Even well administered networks are vulnerable to attack. Vulnerabilities are …
A description logic ontology for email phishing
F Tchakounté, D Molengar… - International Journal of …, 2020 - dergipark.org.tr
Phishing detection is an area of identifying malicious activities designed by phishers to lure
users providing sensitive information. Existing anti-phishing systems use blacklists based on …
users providing sensitive information. Existing anti-phishing systems use blacklists based on …
Adaptive modelling for security analysis of networked control systems
J Wolf, F Wiezorek, F Schiller, G Hansch… - … Symposium for ICS …, 2016 - scienceopen.com
Incomplete information about connectivity and functionality of elements of networked control
systems is a challenging issue in applying model-based security analysis in practice. This …
systems is a challenging issue in applying model-based security analysis in practice. This …
[PDF][PDF] Automating security risk and requirements management for cyber-physical systems
G Hansch - 2020 - ediss.uni-goettingen.de
Abstract Cyber-Physical Systems enable various modern use cases and business models
such as connected vehicles, the Smart (power) Grid, or the Industrial Internet of Things. Their …
such as connected vehicles, the Smart (power) Grid, or the Industrial Internet of Things. Their …
Reconciliation engine and metric for network vulnerability assessment
HV Nath, K Gangadharan… - Proceedings of the First …, 2012 - dl.acm.org
Vulnerability reconciliation is the process that analyses the output produced by one or more
vulnerability scanners and provides a more succinct and high-level view of vulnerabilities …
vulnerability scanners and provides a more succinct and high-level view of vulnerabilities …
A logic-based approach to network security risk assessment
Y Ji, D Wen, H Wang, C **a - 2009 ISECS International …, 2009 - ieeexplore.ieee.org
An important problem in network security risk assessment is to uncover network threats due
to current software vulnerabilities and misconfigurations. This paper proposes a logic …
to current software vulnerabilities and misconfigurations. This paper proposes a logic …
A fuzzy description logic model for Intrusion Detection Systems
Z Baniasadi, A Sanei, MR Omidi - 2010 5th International …, 2010 - ieeexplore.ieee.org
Today most managing network security systems, especially Intrusion Detection System
(IDS), play a significant role in computer societies and due to the evolution of threats, the use …
(IDS), play a significant role in computer societies and due to the evolution of threats, the use …
Vulnerability analysis of intelligent network system
D Yan, F Yang - 2009 International Conference on Networks …, 2009 - ieeexplore.ieee.org
All attacks come from the successful utilization of the vulnerabilities of the
telecommunication network or systems by the attackers. So it is the first important thing to …
telecommunication network or systems by the attackers. So it is the first important thing to …
[PDF][PDF] Modeling computer insecurity
In this paper, we present a formal model of computer security based on the universal Turing
machine. This model allows us to conclude that given a machine and policy, the problem of …
machine. This model allows us to conclude that given a machine and policy, the problem of …