![Scientific and technical journal «Priborostroenie»](/images/mag-pr.png)
CONSTRUCTION OF INTEGRATED BASE OF VULNERABILITIES
![Scientific and technical journal «Priborostroenie»](/images/mag-pr.png)
Annotation
Results of analysis of open databases of vulnerabilities are presented. The process of the bases integration in evaluation system of computer networks security is described. A model of the base formation process and structure of integrated base of vulnerabilities is proposed.
Keywords
Постоянный URL
Articles in current issue
- CONCEPT OF PROACTIVE CONTROL OVER COMPLEX OBJECTS: THEORETICAL AND TECHNOLOGICAL BASIS
- OPTIMIZATION OF THE ROUTING MATRIX IN QUEUING NETWORKS
- INFORMATION MODEL OF DISTRIBUTED EVENTS SUPPORT AT INTELLIGENT MEETING ROOM
- MODIFIED MODEL OF FLEXIBLE REDISTRIBUTION OF INFORMATION INTERACTION OPERATIONS
- VALUATION MODEL OF SPACECRAFT FUEL CONSUMPTION WITH CONSIDERATION FOR CONTINGENCY
- MODELING AND IDENTIFICATION OF OBJECT-ORIENTED SOFTWARE CODE DEFECTS
- METHOD OF CF-GRAMMAR REGULARIZATION FOR LANGUAGE PROCESSORS
- SYNTHESIS OF STRUCTURAL DYNAMICS MODELING SCENARIOS FOR AUTOMATED CONTROL SYSTEM OF ACTIVE MOVING OBJECTS
- STUDY OF DYNAMIC AND ENERGY COMPATIBILITY OF POSITIONING SYSTEM AND ANGULAR MOTION CONTROL OF SPACE SOLAR POWER PLANT
- THE SAMPO+ SYSTEM FOR CREATION AND ANALYSIS OF SOFTWARE HISTORICAL DATABASES
- CONSTRUCTION OF INTEGRATED BASE OF VULNERABILITIES
- SECURE ENCRYPTION PROTOCOL EMPLOYING SHORT KEYS
- MONITORING OF CURRENT SITUATION AND SUPPORT OF DECISION MAKING IN COMPUTER NETWORK SECURITY BASED ON THE SECURITY METRICS SYSTEM