Vulnerability Prioritization: An Offensive Security Approach.
Muhammed Fatih BulutAbdulhamid AdebayoDaby SowSteve OcepekPublished in: CoRR (2022)
Keyphrases
- security vulnerabilities
- buffer overflow
- risk assessment
- information security
- intrusion detection
- security risks
- security requirements
- network security
- penetration testing
- statistical databases
- key management
- security systems
- computer security
- security issues
- security mechanisms
- neural network
- information assurance
- access control
- security measures
- security threats
- security policies
- real time
- ad hoc networks
- denial of service attacks
- high security
- team formation
- denial of service
- dos attacks
- database systems
- encryption scheme