Towards Automated Assessment of Vulnerability Exposures in Security Operations.
Philip Dale HuffQinghua LiPublished in: SecureComm (1) (2021)
Keyphrases
- risk assessment
- security vulnerabilities
- network security
- buffer overflow
- information security
- fully automated
- semi automated
- security risks
- information assurance
- computer security
- access control
- risk management
- statistical databases
- intrusion detection
- decision making
- security properties
- security protocols
- automated analysis
- security requirements
- security mechanisms
- human operators
- security issues
- security policies
- functional requirements
- database
- data security
- cryptographic protocols
- security problems
- security threats
- assessment process
- quality assessment
- intrusion detection system
- information systems