Understanding the Quality of Container Security Vulnerability Detection Tools.
Omar JavedSalman ToorPublished in: CoRR (2021)
Keyphrases
- detection algorithm
- high quality
- end users
- risk assessment
- software tools
- automatic detection
- false positives
- detection method
- user friendliness
- object detection
- access control
- buffer overflow
- security vulnerabilities
- computational tools
- visual analytics
- computer security
- e learning
- network security
- information security
- detection accuracy
- statistical databases
- security policies
- cyber attacks
- malware detection
- security problems
- decision support
- intrusion detection