For example,Бобцов

CONSTRUCTION OF INTEGRATED BASE OF VULNERABILITIES

Annotation

Results of analysis of open databases of vulnerabilities are presented. The process of the bases integration in evaluation system of computer networks security is described. A model of the base formation process and structure of integrated base of vulnerabilities is proposed.

Keywords

Articles in current issue