Performance of automated network vulnerability scanning at remediating security issues.
Hannes HolmPublished in: Comput. Secur. (2012)
Keyphrases
- security issues
- enterprise network
- security threats
- security problems
- buffer overflow
- information security
- security mechanisms
- cloud computing
- network traffic
- database
- cyber security
- technical issues
- metadata
- wireless sensor networks
- rfid tags
- network management
- cyber attacks
- peer to peer
- web applications
- database systems
- decision making