Taxonomies of attacks and vulnerabilities in computer systems

VM Igure, RD Williams - IEEE Communications Surveys & …, 2008 - ieeexplore.ieee.org
Security assessment of a system is a difficult problem. Most of the current efforts in security
assessment involve searching for known vulnerabilities. Finding unknown vulnerabilities still …

A survey of attacks on ethereum smart contracts (sok)

N Atzei, M Bartoletti, T Cimoli - Principles of Security and Trust: 6th …, 2017 - Springer
Smart contracts are computer programs that can be correctly executed by a network of
mutually distrusting nodes, without the need of an external trusted authority. Since smart …

A taxonomy of network and computer attacks

S Hansman, R Hunt - Computers & Security, 2005 - Elsevier
Attacks over the years have become both increasingly numerous and sophisticated. This
paper focuses on the provisioning of a method for the analysis and categorisation of both …

[書籍][B] Software vulnerability analysis

IV Krsul - 1998 - search.proquest.com
INFORMATION TO USERS Page 1 INFORMATION TO USERS This manuscript has been
reproduced from the microfilm master. UMI films the text directly from the original or copy …

A methodology for testing intrusion detection systems

NJ Puketza, K Zhang, M Chung… - IEEE Transactions …, 1996 - ieeexplore.ieee.org
Intrusion detection systems (IDSs) attempt to identify unauthorized use, misuse, and abuse
of computer systems. In response to the growth in the use and development of IDSs, the …

Protocol-parsing state machine and method of using same

RM Gupta, PK Jain, KE Amidon, F Gong… - US Patent …, 2007 - Google Patents
An intrusion signature describing an attack is stored on a computer. Once a plurality of
internet protocol packets is received, the plurality of internet protocol packets collec tively …

[PDF][PDF] A review on taxonomies of attacks and vulnerability in computer and network system

C Joshi, UK Singh, K Tarey - International Journal, 2015 - researchgate.net
In order to gain trusted system detection and remediation of vulnerability is crucial. In
computer network to solve the problem of security vulnerability, study of vulnerability is …

Hierarchy-based method and apparatus for detecting attacks on a computer system

RM Gupta, PK Jain, KE Amidon, F Gong… - US Patent …, 2007 - Google Patents
A method of provisioning a computer against computer attacks includes constructing a
hierarchy characterizing different computer attacks and counter measures, and traversing …

Blendsps: A blockchain-enabled decentralized smart public safety system

R Xu, SY Nikouei, D Nagothu, A Fitwi, Y Chen - Smart Cities, 2020 - mdpi.com
Due to the recent advancements in the Internet of Things (IoT) and Edge-Fog-Cloud
Computing technologies, the Smart Public Safety (SPS) system has become a more realistic …

Method and apparatus for detecting intrusions on a computer system

RM Gupta, PK Jain, KE Amidon, F Gong… - US Patent …, 2009 - Google Patents
5,621,889 5,769,942 5,798,706 5,805,801 5,812,763 5,864,683 5,892,903 5,898,830
5,905,859 5,919,257 5,919,258 5,940,591 5,960, 170 6,038.317 6,052,531 6,052,788 …