The Common Vulnerability Scoring System vs. Rock Star Vulnerabilities: Why the Discrepancy?
Doudou FallYouki KadobayashiPublished in: ICISSP (2019)
Keyphrases
- buffer overflow
- security vulnerabilities
- attack graphs
- attack graph
- security risks
- denial of service
- scoring model
- information security
- penetration testing
- dos attacks
- risk assessment
- countermeasures
- security properties
- multi agent
- security issues
- database
- security problems
- computer systems
- wireless sensor networks
- website
- star shaped
- information systems
- information retrieval
- neural network