Vulnerability assessment simulation for information infrastructure protection

6Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The main contribution of this research is to present the method that make it possible to assess the vulnerability in the information infrastructure using simulation technology. To construct the vulnerability assessment simulation system, we make use of the knowledge-based simulation modeling methodology and we designed expressions to estimate the degree of vulnerability of host. Also, we show newly defined vulnerability analysis method that is applicable to vulnerability assessment simulation system. As research results, the vulnerability assessment simulation system and VDBFS(Vulnerability DataBase For Simulator) are constructed.

Cite

CITATION STYLE

APA

Kim, H. J., Koh, K. H., Shin, D. H., & Kim, H. G. (2002). Vulnerability assessment simulation for information infrastructure protection. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2437, pp. 145–161). Springer Verlag. https://doi.org/10.1007/3-540-45831-x_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free