Taxonomies of attacks and vulnerabilities in computer systems
Security assessment of a system is a difficult problem. Most of the current efforts in security
assessment involve searching for known vulnerabilities. Finding unknown vulnerabilities still …
assessment involve searching for known vulnerabilities. Finding unknown vulnerabilities still …
A survey of attacks on ethereum smart contracts (sok)
Smart contracts are computer programs that can be correctly executed by a network of
mutually distrusting nodes, without the need of an external trusted authority. Since smart …
mutually distrusting nodes, without the need of an external trusted authority. Since smart …
A taxonomy of network and computer attacks
S Hansman, R Hunt - Computers & Security, 2005 - Elsevier
Attacks over the years have become both increasingly numerous and sophisticated. This
paper focuses on the provisioning of a method for the analysis and categorisation of both …
paper focuses on the provisioning of a method for the analysis and categorisation of both …
[書籍][B] Software vulnerability analysis
IV Krsul - 1998 - search.proquest.com
INFORMATION TO USERS Page 1 INFORMATION TO USERS This manuscript has been
reproduced from the microfilm master. UMI films the text directly from the original or copy …
reproduced from the microfilm master. UMI films the text directly from the original or copy …
A methodology for testing intrusion detection systems
NJ Puketza, K Zhang, M Chung… - IEEE Transactions …, 1996 - ieeexplore.ieee.org
Intrusion detection systems (IDSs) attempt to identify unauthorized use, misuse, and abuse
of computer systems. In response to the growth in the use and development of IDSs, the …
of computer systems. In response to the growth in the use and development of IDSs, the …
Protocol-parsing state machine and method of using same
RM Gupta, PK Jain, KE Amidon, F Gong… - US Patent …, 2007 - Google Patents
An intrusion signature describing an attack is stored on a computer. Once a plurality of
internet protocol packets is received, the plurality of internet protocol packets collec tively …
internet protocol packets is received, the plurality of internet protocol packets collec tively …
[PDF][PDF] A review on taxonomies of attacks and vulnerability in computer and network system
C Joshi, UK Singh, K Tarey - International Journal, 2015 - researchgate.net
In order to gain trusted system detection and remediation of vulnerability is crucial. In
computer network to solve the problem of security vulnerability, study of vulnerability is …
computer network to solve the problem of security vulnerability, study of vulnerability is …
Hierarchy-based method and apparatus for detecting attacks on a computer system
RM Gupta, PK Jain, KE Amidon, F Gong… - US Patent …, 2007 - Google Patents
A method of provisioning a computer against computer attacks includes constructing a
hierarchy characterizing different computer attacks and counter measures, and traversing …
hierarchy characterizing different computer attacks and counter measures, and traversing …
Blendsps: A blockchain-enabled decentralized smart public safety system
Due to the recent advancements in the Internet of Things (IoT) and Edge-Fog-Cloud
Computing technologies, the Smart Public Safety (SPS) system has become a more realistic …
Computing technologies, the Smart Public Safety (SPS) system has become a more realistic …
Method and apparatus for detecting intrusions on a computer system
RM Gupta, PK Jain, KE Amidon, F Gong… - US Patent …, 2009 - Google Patents
5,621,889 5,769,942 5,798,706 5,805,801 5,812,763 5,864,683 5,892,903 5,898,830
5,905,859 5,919,257 5,919,258 5,940,591 5,960, 170 6,038.317 6,052,531 6,052,788 …
5,905,859 5,919,257 5,919,258 5,940,591 5,960, 170 6,038.317 6,052,531 6,052,788 …