Assessment of Windows System Security Using Vulnerability Relationship Graph.
Yongzheng ZhangBinxing FangYue ChiXiao-chun YunPublished in: CIS (2) (2005)
Keyphrases
- risk assessment
- information security
- security vulnerabilities
- computer security
- network security
- access control
- security issues
- structured data
- security risks
- graph representation
- statistical databases
- graph structure
- security requirements
- denial of service
- security problems
- windows xp
- undirected graph
- random walk
- security policies
- directed acyclic graph
- weighted graph
- graph theory
- risk management
- graph matching
- directed graph
- connected components
- intrusion detection
- graph model
- graph mining
- graph theoretic
- key management
- security systems
- buffer overflow
- penetration testing