ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Managing A Network Vulnerability Assessment
Mapping Intimacies
◽
10.1201/9780203503041
◽
2017
◽
Cited By ~ 12
Author(s):
Thomas R. Peltier
◽
Justin Peltier
◽
John A. Blackley
Keyword(s):
Vulnerability Assessment
◽
Network Vulnerability
Download Full-text
Related Documents
Cited By
References
Network Vulnerability Assessment Methodology
Managing A Network Vulnerability Assessment
◽
10.1201/9780203503041-8
◽
2017
◽
pp. 61-94
Keyword(s):
Vulnerability Assessment
◽
Network Vulnerability
◽
Assessment Methodology
Download Full-text
Design and Implementation of Computer Network Vulnerability Assessment System
Proceedings of the The 1st EAI International Conference on Multimedia Technology and Enhanced Learning
◽
10.4108/eai.28-2-2017.152297
◽
2017
◽
Author(s):
Tianli Li
Keyword(s):
Vulnerability Assessment
◽
Computer Network
◽
Assessment System
◽
Network Vulnerability
◽
Design And Implementation
Download Full-text
Internet of Things Based Solutions for Transport Network Vulnerability Assessment in Intelligent Transportation Systems
Computers Materials & Continua
◽
10.32604/cmc.2020.09113
◽
2020
◽
Vol 65
(3)
◽
pp. 2511-2527
Author(s):
Weiwei Liu
◽
Yang Tang
◽
Fei Yang
◽
Chennan Zhang
◽
Dun Cao
◽
...
Keyword(s):
Internet Of Things
◽
Vulnerability Assessment
◽
Intelligent Transportation Systems
◽
Intelligent Transportation
◽
Transportation Systems
◽
Transport Network
◽
Network Vulnerability
Download Full-text
Effective Network Vulnerability Assessment through Model Abstraction
Detection of Intrusions and Malware, and Vulnerability Assessment - Lecture Notes in Computer Science
◽
10.1007/978-3-642-22424-9_2
◽
2011
◽
pp. 17-34
◽
Cited By ~ 10
Author(s):
Su Zhang
◽
Xinming Ou
◽
John Homer
Keyword(s):
Vulnerability Assessment
◽
Network Vulnerability
◽
Model Abstraction
◽
Effective Network
Download Full-text
Detecting critical nodes for network vulnerability assessment under cascading failures
2017 International Conference on System Science and Engineering (ICSSE)
◽
10.1109/icsse.2017.8030933
◽
2017
◽
Author(s):
Shi-Ming Hu
◽
Jung-Te Chou
◽
Bing-Hong Liu
◽
Shao-I Chu
◽
Thinagaran Perumal
◽
...
Keyword(s):
Vulnerability Assessment
◽
Cascading Failures
◽
Network Vulnerability
◽
Critical Nodes
Download Full-text
Oil and gas pipeline network vulnerability assessment using geographic information systems
The APPEA Journal
◽
10.1071/aj07074
◽
2008
◽
Vol 48
(2)
◽
pp. 484
Author(s):
John Prabaharan
Keyword(s):
Information Systems
◽
Geographic Information Systems
◽
Vulnerability Assessment
◽
Oil And Gas
◽
Geographic Information
◽
Gas Pipeline
◽
Network Vulnerability
◽
Pipeline Network
Download Full-text
Network vulnerability assessment under cascading failures
2013 IEEE Global Communications Conference (GLOBECOM)
◽
10.1109/glocom.2013.6831290
◽
2013
◽
Author(s):
Yilin Shen
◽
My T. Thai
Keyword(s):
Vulnerability Assessment
◽
Cascading Failures
◽
Network Vulnerability
Download Full-text
Fighting Fire with Fire: Automated Network Vulnerability Assessment
Computer Fraud & Security
◽
10.1016/s1361-3723(02)00709-1
◽
2002
◽
Vol 2002
(7)
◽
pp. 7-9
Author(s):
Adil Pastakia
Keyword(s):
Vulnerability Assessment
◽
Network Vulnerability
Download Full-text
Design and Implementation of Computer Network Vulnerability Assessment System
2017 5th International Conference on Computer, Automation and Power Electronics (CAPE 2017)
◽
10.25236/cape.2017.030
◽
2017
◽
Keyword(s):
Vulnerability Assessment
◽
Computer Network
◽
Assessment System
◽
Network Vulnerability
◽
Design And Implementation
Download Full-text
A Kind of Hierarchical Network Vulnerability Assessment Model Based on Attack Graph
Computer Science and Artificial Intelligence
◽
10.1142/9789813220294_0045
◽
2017
◽
Author(s):
Jun-Chun Ma
◽
Shan Chen
◽
Min Li
◽
Jun-Ping Yao
Keyword(s):
Vulnerability Assessment
◽
Assessment Model
◽
Network Vulnerability
◽
Hierarchical Network
◽
Attack Graph
◽
Model Based
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close