A review of network vulnerabilities scanning tools: types, capabilities and functioning.
Andrea TundisWojciech MazurczykMax MühlhäuserPublished in: ARES (2018)
Keyphrases
- network administrators
- peer to peer
- multiple types
- decision support
- attack graphs
- wireless sensor networks
- network management
- network security
- computer networks
- heterogeneous networks
- network monitoring
- network structure
- software tools
- network model
- countermeasures
- information security
- network traffic
- complex networks
- buffer overflow