Search
Search Results
-
Vulnerability Assessment and Penetration Testing
Vulnerability assessment is a comprehensive process aimed at identifying, quantifying, and prioritizing vulnerabilities within a system. This system... -
Detection of Intrusions and Malware, and Vulnerability Assessment 21st International Conference, DIMVA 2024, Lausanne, Switzerland, July 17–19, 2024, Proceedings
This book constitutes the proceedings of the 21st International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment,...
-
Cyber-Attack Analysis Using Vulnerability Assessment and Penetration Testing
Networks and systems like computers and mobile devices are not secure enough and are vulnerable to numerous types of cyber-threats. The frequency of... -
Vulnerability Assessment and Management for Coastal Erosion
The significance of coastal regions for global sustainability cannot be overstated. Coastal conditions are constantly changing and working to... -
Detection of Intrusions and Malware, and Vulnerability Assessment 20th International Conference, DIMVA 2023, Hamburg, Germany, July 12–14, 2023, Proceedings
This book constitutes the proceedings of the 20th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment,... -
Vulnerability Assessment Framework Based on In-The-Wild Exploitability for Prioritizing Patch Application in Control System
With the increasing understanding of attackers towards the characteristics of control systems and the growing connectivity with information... -
Dynamic vulnerability severity calculator for industrial control systems
The convergence of information and communication technologies has introduced new and advanced capabilities to Industrial Control Systems. However,...
-
Detection of Intrusions and Malware, and Vulnerability Assessment 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 –July 1, 2022, Proceedings
This book constitutes the proceedings of the 19th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment,... -
A vehicle firmware security vulnerability: an IVI exploitation
In the last years, the increasing vehicular technology has led to a surge in cybersecurity attacks, particularly regarding connected vehicles and...
-
Comprehensive vulnerability aspect extraction
Extracting valuable information from unstructured vulnerability reports constitutes a fundamental task in numerous cybersecurity applications....
-
Tropical Cyclones and Coastal Vulnerability: Assessment and Mitigation
Tropical cyclone (TC) landfalls are among the most damaging natural disasters. The North Indian Ocean (NIO) experiences ~12% of all cyclones every... -
Resilience & Vulnerability: Concepts and Policy Contexts
Climate change is an unparalleled global challenge, with profound implications for the environment, societies, and economies. As the Earth’s climate... -
Vulnerability management in Linux distributions
Vulnerabilities in software systems not only lead to loss of revenue, but also to loss of reputation and trust. To avoid this, software providers...
-
Advancing Software Vulnerability Scoring: A Statistical Approach with Machine Learning Techniques and GridSearchCV Parameter Tuning
The growing complexity, diversity, and importance of software pose a significant threat to computer system security due to exploitable software...
-
Generating ICS vulnerability playbooks with open standards
Organizations face attacks on industrial control systems (ICS) as vulnerabilities are pervasive. However, patching vulnerable systems by simply...
-
ProRLearn: boosting prompt tuning-based vulnerability detection by reinforcement learning
Software vulnerability detection is a critical step in ensuring system security and data protection. Recent research has demonstrated the...
-
Identifying the systemic importance and systemic vulnerability of financial institutions based on portfolio similarity correlation network
The indirect correlation among financial institutions, stemming from similarities in their portfolios, is a primary driver of systemic risk. However,...
-
-
A Security and Vulnerability Assessment on Android Gambling Applications
Due to the pandemic, along with its lockdowns, a lot of entertainment places have temporarily or permanently closed down, like casinos. Since they... -
Assessing Vulnerability from Its Description
This paper shows an end-to-end Artificial Intelligence (AI) system to estimate the severity level and the various Common Vulnerability Scoring System...