Journal
Scientific and technical journal «Priborostroenie»
UDK004.056
Issue:11 (57)
Download PDF382 Kbyte
Results of analysis of open databases of vulnerabilities are presented. The process of the bases integration in evaluation system of computer networks security is described. A model of the base formation process and structure of integrated base of vulnerabilities is proposed.