A cost-effective approach to evaluating security vulnerability scanner.
Yuan-Hsin TungShian-Shyong TsengJen-Feng ShihHwai-Ling ShanPublished in: APNOMS (2013)
Keyphrases
- cost effective
- low cost
- security vulnerabilities
- information security
- risk assessment
- cost effectiveness
- buffer overflow
- rfid tags
- security issues
- network security
- security risks
- security problems
- information and communication technologies
- statistical databases
- network management
- security requirements
- security mechanisms
- security analysis
- denial of service
- long term
- security policies
- security protocols
- intrusion detection