Evaluating the Soundness of Security Metrics from Vulnerability Scoring Frameworks.
Joe SamuelKhalil AalabJason JaskolkaPublished in: TrustCom (2020)
Keyphrases
- scoring model
- security vulnerabilities
- buffer overflow
- information security
- risk assessment
- evaluation methods
- security issues
- intrusion detection
- security threats
- security problems
- access control
- security properties
- security requirements
- security policies
- network security
- functional requirements
- security systems
- evaluation metrics
- information assurance
- penetration testing
- neural network
- evaluation methodology
- key management
- similarity metrics
- security analysis
- data security
- human operators
- security risks