C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild.
Kartik Nayak
Daniel Marino
Petros Efstathopoulos
Tudor Dumitras
Published in:
RAID (2014)
Keyphrases
</>
attack graphs
security vulnerabilities
attack graph
countermeasures
information security
security risks
denial of service
dos attacks
buffer overflow
attack scenarios
data corruption
security patterns
intrusion detection
information systems
computer viruses
surface model
security mechanisms
surface reconstruction