Gotowa bibliografia na temat „CVSS score”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „CVSS score”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "CVSS score"
Nowak, Maciej Roman, Michał Walkowski, and Sławomir Sujecki. "Support for the Vulnerability Management Process Using Conversion CVSS Base Score 2.0 to 3.x." Sensors 23, no. 4 (2023): 1802. http://dx.doi.org/10.3390/s23041802.
Pełny tekst źródłaSaragih, Naikson, and Theo Zebua. "Analisis Keamanan dan Implementasi Secure Code Pada Pengembangan Keamanan Websitefikom-methodist.com Menggunakan Penetration Testing dan CVSS." Jurnal Informatika Kaputama (JIK) 7, no. 2 (2023): 242–53. http://dx.doi.org/10.59697/jik.v7i2.233.
Pełny tekst źródłaLuo, Jian, Kueiming Lo, and Haoran Qu. "A Software Vulnerability Rating Approach Based on the Vulnerability Database." Journal of Applied Mathematics 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/932397.
Pełny tekst źródłaOuraou, Myriam. "Beyond the CVSS: Rethinking the Contextualisation of CVEs in a Connected World." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 490–500. https://doi.org/10.34190/eccws.24.1.3529.
Pełny tekst źródłaKhazaei, Atefeh, Mohammad Ghasemzadeh, and Vali Derhami. "An automatic method for CVSS score prediction using vulnerabilities description." Journal of Intelligent & Fuzzy Systems 30, no. 1 (2015): 89–96. http://dx.doi.org/10.3233/ifs-151733.
Pełny tekst źródłaDavlatov, Sh R., and P. V. Kuchinsky,. "Web resource security analysis based on CVSS metrics." Informatics 17, no. 3 (2020): 72–77. http://dx.doi.org/10.37661/1816-0301-2020-17-3-72-77.
Pełny tekst źródłaDimitris Koutras, Panayiotis Kotzanikolaou, Evangelos Paklatzis, Christos Grigoriadis, and Christos Douligeris. "A framework for automating environmental vulnerability analysis of network services." ITU Journal on Future and Evolving Technologies 5, no. 1 (2024): 104–19. http://dx.doi.org/10.52953/tbfn5500.
Pełny tekst źródłaManai, Elyes, Mohamed Mejri, and Jaouhar Fattahi. "Helping CNAs Generate CVSS Scores Faster and More Confidently Using XAI." Applied Sciences 14, no. 20 (2024): 9231. http://dx.doi.org/10.3390/app14209231.
Pełny tekst źródłaMishchenko, Maksym V., and Mariia S. Dorosh. "An expert system of recommendations for combating cyber threats using CVSS metrics and game theory." Herald of Advanced Information Technology 7, no. 3 (2024): 284–95. http://dx.doi.org/10.15276/hait.07.2024.20.
Pełny tekst źródłaBasya, Fahmi, Mardi Hardjanto, and Ikbal Permana Putra. "SHA512 and MD5 Algorithm Vulnerability Testing Using Common Vulnerability Scoring System (CVSS)." Buana Information Technology and Computer Sciences (BIT and CS) 3, no. 1 (2022): 1–4. http://dx.doi.org/10.36805/bit-cs.v3i1.2046.
Pełny tekst źródłaRozprawy doktorskie na temat "CVSS score"
Cheng, Pengsu. "A Multi-Faceted Approach to Network Security Metric through Combining CVSS Base Scores." Thesis, 2011. http://spectrum.library.concordia.ca/35769/1/Cheng_MASc_F2011.pdf.
Pełny tekst źródłaCzęści książek na temat "CVSS score"
Younis, Awad, Yashwant K. Malaiya, and Indrajit Ray. "Evaluating CVSS Base Score Using Vulnerability Rewards Programs." In ICT Systems Security and Privacy Protection. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-33630-5_5.
Pełny tekst źródłaMohsen, Fadi, Adel Shtayyeh, Riham Naser, Lena Mohammad, and Marten Struijk. "Extending the Exposure Score of Web Browsers by Incorporating CVSS." In Lecture Notes in Computer Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-02067-4_12.
Pełny tekst źródłaNowak, Maciej, Michał Walkowski, and Sławomir Sujecki. "Machine Learning Algorithms for Conversion of CVSS Base Score from 2.0 to 3.x." In Computational Science – ICCS 2021. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77967-2_21.
Pełny tekst źródłaCheng, Pengsu, Lingyu Wang, Sushil Jajodia, and Anoop Singhal. "Refining CVSS-Based Network Security Metrics by Examining the Base Scores." In Network Security Metrics. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66505-4_2.
Pełny tekst źródłaFrigault, Marcel, Lingyu Wang, Sushil Jajodia, and Anoop Singhal. "Measuring the Overall Network Security by Combining CVSS Scores Based on Attack Graphs and Bayesian Networks." In Network Security Metrics. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66505-4_1.
Pełny tekst źródłaNjarui, D. M. G., M. Gatheru, and S. R. Ghimire. "Brachiaria Grass for Climate Resilient and Sustainable Livestock Production in Kenya." In African Handbook of Climate Change Adaptation. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-45106-6_146.
Pełny tekst źródłaWatkins, Lanier, and John S. Hurley. "The Next Generation of Scientific-Based Risk Metrics." In Cyber Warfare and Terrorism. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch099.
Pełny tekst źródłaGandham, Sreedevi, Ghali EN Hanuma Kumar, and Balaji Meriga. "Nutraceuticals: The Potential Agents to Rescue Human Race from Cardiovascular Diseases (CVDs)." In Advancements in Cardiovascular Research and Therapeutics: Molecular and Nutraceutical Perspectives. BENTHAM SCIENCE PUBLISHERS, 2022. http://dx.doi.org/10.2174/9789815050837122010010.
Pełny tekst źródłaSanjeevraddi. M. Satyaraddi, Preetham D, and Manimozhi R. "APACHE LOG4J VULNERABILITY." In INFORMATION TECHNOLOGY & BIOINFORMATICS: INTERNATIONAL CONFERENCE ON ADVANCE IT, ENGINEERING AND MANAGEMENT - SACAIM-2022 (VOL 1). REDSHINE India, 2020. http://dx.doi.org/10.25215/8119070682.06.
Pełny tekst źródłaLiu, Wenming, Rui Zhai, and Fang Zuo. "A Vulnerability Threat Assessment Model Based on Bayesian Networks." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2023. http://dx.doi.org/10.3233/faia230850.
Pełny tekst źródłaStreszczenia konferencji na temat "CVSS score"
Miranda, Lucas, Lucas Senos, Daniel Menasché, et al. "Learning CNA-Oriented CVSS Scores." In 2024 IEEE 13th International Conference on Cloud Networking (CloudNet). IEEE, 2024. https://doi.org/10.1109/cloudnet62863.2024.10815736.
Pełny tekst źródłaMiranda, Lucas, Lucas Senos, Daniel Menasché, et al. "A Product-Oriented Assessment of Vulnerability Severity Through NVD CVSS Scores." In 2025 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2025. https://doi.org/10.1109/icnc64010.2025.10994117.
Pełny tekst źródłaLi, Han, Rongrong Xi, and Li Zhao. "Study on the distribution of CVSS environmental score." In 2015 5th International Conference on Electronics Information and Emergency Communication (ICEIEC). IEEE, 2015. http://dx.doi.org/10.1109/iceiec.2015.7284502.
Pełny tekst źródłaNowak, Maciej, Michal Walkowski, and Slawomir Sujecki. "Conversion of CVSS Base Score from 2.0 to 3.1." In 2021 International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2021. http://dx.doi.org/10.23919/softcom52868.2021.9559092.
Pełny tekst źródłaVasireddy, Dinesh T., Dakota S. Dale, and Qinghua Li. "CVSS Base Score Prediction Using an Optimized Machine Learning Scheme." In 2023 Resilience Week (RWS). IEEE, 2023. http://dx.doi.org/10.1109/rws58133.2023.10284627.
Pełny tekst źródłaZhang, Siqi, Minjie Cai, Mengyuan Zhang, Lianying Zhao, and Xavier de Carné de Carnavalet. "The Flaw Within: Identifying CVSS Score Discrepancies in the NVD." In 2023 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, 2023. http://dx.doi.org/10.1109/cloudcom59040.2023.00039.
Pełny tekst źródłaVasilyev, Vladimir, Anastasia Kirillova, Alexey Vulfin, and Andrey Nikonov. "Cybersecurity Risk Assessment Based on Cognitive Attack Vector Modeling with CVSS Score." In 2021 International Conference on Information Technology and Nanotechnology (ITNT). IEEE, 2021. http://dx.doi.org/10.1109/itnt52450.2021.9649191.
Pełny tekst źródłaBalsam, Artur, Michał Walkowski, Maciej Nowak, Jacek Oko, and Sławomir Sujecki. "Automated Calculation of CVSS v3.1 Temporal Score Based on Apache Log4j 2021 Vulnerabilities." In 2023 International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2023. http://dx.doi.org/10.23919/softcom58365.2023.10271671.
Pełny tekst źródłaRao, Parimi Mastan, and Prof Shekar Babu. "Prioritize Software Vulnerabilities by Classifying based on the CVSS score and Textual Description." In 1st Indian International Conference on Industrial Engineering and Operations Management. IEOM Society International, 2021. http://dx.doi.org/10.46254/in01.20210245.
Pełny tekst źródłaKioskli, Kitty, and Nineta Polemi. "Estimating Attackers’ Profiles Results in More Realistic Vulnerability Severity Scores." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002211.
Pełny tekst źródłaRaporty organizacyjne na temat "CVSS score"
A, Bengolea, García D, Balaciano G, Donato M, Donato M, and Iusef N. Alternativas farmacológicas para el tratamiento de pacientes con atrofia medular espinal. Epistemonikos Interactive Evidence Synthesis, 2024. http://dx.doi.org/10.30846/ies.dc6f192c69.
Pełny tekst źródłaA, Bengolea, García D, Balaciano G, Donato M, Donato M, and Iusef N. Alternativas farmacológicas para el tratamiento de pacientes con atrofia medular espinal. Epistemonikos Interactive Evidence Synthesis, 2023. http://dx.doi.org/10.30846/ies.dc6f192c69.v1.
Pełny tekst źródła