CONSTRUCTION OF INTEGRATED BASE OF VULNERABILITIES
Annotation
Results of analysis of open databases of vulnerabilities are presented. The process of the bases integration in evaluation system of computer networks security is described. A model of the base formation process and structure of integrated base of vulnerabilities is proposed.
Keywords
Постоянный URL
Articles in current issue
- CONCEPT OF PROACTIVE CONTROL OVER COMPLEX OBJECTS: THEORETICAL AND TECHNOLOGICAL BASIS
- OPTIMIZATION OF THE ROUTING MATRIX IN QUEUING NETWORKS
- INFORMATION MODEL OF DISTRIBUTED EVENTS SUPPORT AT INTELLIGENT MEETING ROOM
- MODIFIED MODEL OF FLEXIBLE REDISTRIBUTION OF INFORMATION INTERACTION OPERATIONS
- VALUATION MODEL OF SPACECRAFT FUEL CONSUMPTION WITH CONSIDERATION FOR CONTINGENCY
- MODELING AND IDENTIFICATION OF OBJECT-ORIENTED SOFTWARE CODE DEFECTS
- METHOD OF CF-GRAMMAR REGULARIZATION FOR LANGUAGE PROCESSORS
- SYNTHESIS OF STRUCTURAL DYNAMICS MODELING SCENARIOS FOR AUTOMATED CONTROL SYSTEM OF ACTIVE MOVING OBJECTS
- STUDY OF DYNAMIC AND ENERGY COMPATIBILITY OF POSITIONING SYSTEM AND ANGULAR MOTION CONTROL OF SPACE SOLAR POWER PLANT
- THE SAMPO+ SYSTEM FOR CREATION AND ANALYSIS OF SOFTWARE HISTORICAL DATABASES
- SECURE ENCRYPTION PROTOCOL EMPLOYING SHORT KEYS
- MONITORING OF CURRENT SITUATION AND SUPPORT OF DECISION MAKING IN COMPUTER NETWORK SECURITY BASED ON THE SECURITY METRICS SYSTEM