Analyzing vulnerabilities and measuring security level at design and exploitation stages of computer network life cycle

10Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Vulnerability detection and security level estimation are actual tasks of protecting computer networks. The paper considers the models and architectures of intelligent components intended for active analyzing computer network vulnerabilities and estimating its security level. The offered approach is based on simulation of computer attacks on different levels of detail and intended for implementation at various stages of computer network life cycle, including design and exploitation stages. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Kotenko, I., & Stepashkin, M. (2005). Analyzing vulnerabilities and measuring security level at design and exploitation stages of computer network life cycle. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3685 LNCS, pp. 311–324). https://doi.org/10.1007/11560326_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free