Review paper

Analysis of vulnerability assessment results based on CAOS

Volume: 11, Issue: 7, Pages: 4321 - 4331
Published: Oct 1, 2011
Abstract
Information system security must battle regularly with new threats that jeopardize the protection of those systems. Security tests have to be run periodically not only to identify vulnerabilities but also to control information systems, network devices, services and communications. Vulnerability assessments gather large amounts of data to be further analyzed by security experts, who recently have started using data analysis techniques to extract...
Paper Details
Title
Analysis of vulnerability assessment results based on CAOS
Published Date
Oct 1, 2011
Volume
11
Issue
7
Pages
4321 - 4331
Citation AnalysisPro
  • Scinapse’s Top 10 Citation Journals & Affiliations graph reveals the quality and authenticity of citations received by a paper.
  • Discover whether citations have been inflated due to self-citations, or if citations include institutional bias.