Vulnerability detection and security level estimation are actual tasks of protecting computer networks. The paper considers the models and architectures of intelligent components intended for active analyzing computer network vulnerabilities and estimating its security level. The offered approach is based on simulation of computer attacks on different levels of detail and intended for implementation at various stages of computer network life cycle, including design and exploitation stages. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Kotenko, I., & Stepashkin, M. (2005). Analyzing vulnerabilities and measuring security level at design and exploitation stages of computer network life cycle. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3685 LNCS, pp. 311–324). https://doi.org/10.1007/11560326_24
Mendeley helps you to discover research relevant for your work.