Vulnerability Metrics for Graph-based Configuration Security.
Ibifubara IganiboMassimiliano AlbaneseMarc MoskoEric BierAlejandro E. BritoPublished in: SECRYPT (2021)
Keyphrases
- security vulnerabilities
- risk assessment
- information security
- buffer overflow
- computer security
- intrusion detection
- security requirements
- security issues
- security risks
- access control
- security policies
- graph theoretic
- security problems
- security systems
- network security
- statistical databases
- optimal configuration
- security mechanisms
- security management
- neural network
- security measures
- information assurance
- penetration testing
- security model
- key management
- sensitive data
- graph model
- evaluation metrics
- smart card
- semi supervised
- data mining