Applied Computing

  • Simmonds A
  • Sandilands P
  • Ekert L
ISSN: 03029743
N/ACitations
Citations of this article
49Readers
Mendeley users who have this article in their library.

Abstract

We first consider network security services and then review threats, vulnerabilities and failure modes. This review is based on standard texts, using well-known concepts, categorizations, and methods, e.g. risk analysis using asset-based threat profiles and vulnerability profiles (attributes). The review is used to construct a framework which is then used to define an extensible ontology for network security attacks. We present a conceptualization of this ontology in figure 1. Keywords: network, cyber, security, ontology, attack, threat, vulnerability, failure.

Cite

CITATION STYLE

APA

Simmonds, A., Sandilands, P., & Ekert, L. V. (2004). Applied Computing. Network Security (Vol. 3285, pp. 317–323). Retrieved from http://www.springerlink.com/index/1LQ24LD9UDHX9G8Q.pdf

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free