Fundamentals of computer security technology
Fundamentals of computer security technology
A taxonomy of computer program security flaws
ACM Computing Surveys (CSUR)
Firewalls and Internet security: repelling the wily hacker
Firewalls and Internet security: repelling the wily hacker
An analysis of security incidents on the Internet 1989-1995
An analysis of security incidents on the Internet 1989-1995
Testing for Software Vulnerability Using Environment Perturbation
DSN '00 Proceedings of the 2000 International Conference on Dependable Systems and Networks (formerly FTCS-30 and DCCA-8)
Software vulnerability analysis
Software vulnerability analysis
A taxonomy of computer attacks with applications to wireless networks
A taxonomy of computer attacks with applications to wireless networks
A software flaw taxonomy: aiming tools at security
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
Operating system integrity in OS/VS2
IBM Systems Journal
Taxonomies of attacks and vulnerabilities in computer systems
IEEE Communications Surveys & Tutorials
Hi-index | 0.00 |
Classification of network vulnerability is critical to detection and risk analysis of network vulnerability. A broad range of classification methods have been proposed in literature. This paper reviews a total of 25 selected approaches and identifies the differences and relations among them. It also points out some open issues for research in this field.