Gotowa bibliografia na temat „CVSS score”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „CVSS score”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "CVSS score"

1

Nowak, Maciej Roman, Michał Walkowski, and Sławomir Sujecki. "Support for the Vulnerability Management Process Using Conversion CVSS Base Score 2.0 to 3.x." Sensors 23, no. 4 (2023): 1802. http://dx.doi.org/10.3390/s23041802.

Pełny tekst źródła
Streszczenie:
COVID-19 forced a number of changes in many areas of life, which resulted in an increase in human activity in cyberspace. Furthermore, the number of cyberattacks has increased. In such circumstances, detection, accurate prioritisation, and timely removal of critical vulnerabilities is of key importance for ensuring the security of various organisations. One of the most-commonly used vulnerability assessment standards is the Common Vulnerability Scoring System (CVSS), which allows for assessing the degree of vulnerability criticality on a scale from 0 to 10. Unfortunately, not all detected vuln
Style APA, Harvard, Vancouver, ISO itp.
2

Saragih, Naikson, and Theo Zebua. "Analisis Keamanan dan Implementasi Secure Code Pada Pengembangan Keamanan Websitefikom-methodist.com Menggunakan Penetration Testing dan CVSS." Jurnal Informatika Kaputama (JIK) 7, no. 2 (2023): 242–53. http://dx.doi.org/10.59697/jik.v7i2.233.

Pełny tekst źródła
Streszczenie:
Keamanan website fikom-methodist.com adalah hal yang penting sebagai Portal aplikasi administrasi data internal di Fakultas Ilmu Komputer Universitas Methodist Indonesia. Sayangnya fikom-methodist.com pernah diserang dan tercatat dalam rekam jejak pada Global Cyber Vandalism Mirror Database. Penelitian diawali dengan analisis tingkat resiko keamanan menggunakan CVSS. Berdasarkan hasil analisis dilanjutkan dengan pengujian serangan meliputi SQL Injection, Cross Site Scripting, Broken Access Control, Unrestricted File Upload (Backdooring) serta defacing. Implementasi secure code dilakukan dengan
Style APA, Harvard, Vancouver, ISO itp.
3

Luo, Jian, Kueiming Lo, and Haoran Qu. "A Software Vulnerability Rating Approach Based on the Vulnerability Database." Journal of Applied Mathematics 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/932397.

Pełny tekst źródła
Streszczenie:
CVSS is a specification for measuring the relative severity of software vulnerabilities. The performance values of the CVSS given by CVSS-SIG cannot describe the reasons for the software vulnerabilities. This approach fails to distinguish between software vulnerabilities that have the same score but different levels of severity. In this paper, a software vulnerability rating approach (SVRA) is proposed. The vulnerability database is used by SVRA to analyze the frequencies of CVSS’s metrics at different times. Then, the equations for both exploitability and impact subscores are given in terms o
Style APA, Harvard, Vancouver, ISO itp.
4

Ouraou, Myriam. "Beyond the CVSS: Rethinking the Contextualisation of CVEs in a Connected World." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 490–500. https://doi.org/10.34190/eccws.24.1.3529.

Pełny tekst źródła
Streszczenie:
In the context of globalized information technology, managing the growing number of Common Vulnerability Exposures (CVE) has become one of the most complex challenges for security teams. CVEs affect everyone: whether you are Microsoft Corporation, a national government, or an ordinary global citizen, no one is immune. The burden on cybersecurity entities is now heavier than ever. The more diverse assets a system holds, the broader its monitoring scope must be. Therefore, to avoid overwhelming operational and security teams, it is crucial to adapt the contextualization of CVEs to address emergi
Style APA, Harvard, Vancouver, ISO itp.
5

Khazaei, Atefeh, Mohammad Ghasemzadeh, and Vali Derhami. "An automatic method for CVSS score prediction using vulnerabilities description." Journal of Intelligent & Fuzzy Systems 30, no. 1 (2015): 89–96. http://dx.doi.org/10.3233/ifs-151733.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Davlatov, Sh R., and P. V. Kuchinsky,. "Web resource security analysis based on CVSS metrics." Informatics 17, no. 3 (2020): 72–77. http://dx.doi.org/10.37661/1816-0301-2020-17-3-72-77.

Pełny tekst źródła
Streszczenie:
Based on the analysis of vulnerability data for web resources and the CVSS metric, the distribution of the average CVSS (Common Vulnerability Scoring System standard for calculating a numerical vulnerability score on a ten-point scale) score for the websites of theRepublicofBelaruswas studied. The hypothesis on the distribution of the CVSS vulnerability assessment according to Poisson's law was tested by chi-square criteria. It was found that about 10% of web resources from the original general of samples of 19000 size have a critical averaged assessment level of vulnerability. As part of this
Style APA, Harvard, Vancouver, ISO itp.
7

Dimitris Koutras, Panayiotis Kotzanikolaou, Evangelos Paklatzis, Christos Grigoriadis, and Christos Douligeris. "A framework for automating environmental vulnerability analysis of network services." ITU Journal on Future and Evolving Technologies 5, no. 1 (2024): 104–19. http://dx.doi.org/10.52953/tbfn5500.

Pełny tekst źródła
Streszczenie:
The primary objective of this paper is to introduce a comprehensive framework designed to automate the assessment of environmental vulnerability status of communication protocols and networked services, within operational contexts. The proposed algorithm leverages the Common Vulnerability Scoring System version 3 (CVSS 3) metrics in conjunction with network security data. The initial step involves the establishment of a network security ontology, which serves to model the environmental attributes associated with the current security posture of communication protocol channels available within a
Style APA, Harvard, Vancouver, ISO itp.
8

Manai, Elyes, Mohamed Mejri, and Jaouhar Fattahi. "Helping CNAs Generate CVSS Scores Faster and More Confidently Using XAI." Applied Sciences 14, no. 20 (2024): 9231. http://dx.doi.org/10.3390/app14209231.

Pełny tekst źródła
Streszczenie:
The number of cybersecurity vulnerabilities keeps growing every year. Each vulnerability must be reported to the MITRE Corporation and assessed by a Counting Number Authority, which generates a metrics vector that determines its severity score. This process can take up to several weeks, with higher-severity vulnerabilities taking more time. Several authors have successfully used Deep Learning to automate the score generation process and used explainable AI to build trust with the users. However, the explanations that were shown were surface label input saliency on binary classification. This i
Style APA, Harvard, Vancouver, ISO itp.
9

Mishchenko, Maksym V., and Mariia S. Dorosh. "An expert system of recommendations for combating cyber threats using CVSS metrics and game theory." Herald of Advanced Information Technology 7, no. 3 (2024): 284–95. http://dx.doi.org/10.15276/hait.07.2024.20.

Pełny tekst źródła
Streszczenie:
This study is focused on the creation of an expert system for generating recommendations on cyber security. The developed expert system uses a game-theoretic model as a inference engine to transform expert knowledge into recommendations for end-users, who may be chief IT security officers (CISOs), system administrators, or cyber security engineers. Expert knowledge is presented in the form of an estimate of the base group of CVSS metrics - Common Vulnerability Score System, for each type of attack and adjusted values of CVSS in the case that the counterattack strategy is applied. Given a set o
Style APA, Harvard, Vancouver, ISO itp.
10

Basya, Fahmi, Mardi Hardjanto, and Ikbal Permana Putra. "SHA512 and MD5 Algorithm Vulnerability Testing Using Common Vulnerability Scoring System (CVSS)." Buana Information Technology and Computer Sciences (BIT and CS) 3, no. 1 (2022): 1–4. http://dx.doi.org/10.36805/bit-cs.v3i1.2046.

Pełny tekst źródła
Streszczenie:
This paper discusses the comparison of the results of testing the OTP (One Time Password) algorithm on two encryptions, namely SHA512 and MD5 which are applied to the Reconciliation Application of the Dinas Pemberdayaan Masyarakat dan Desa Kabupaten Sukabumi. This study uses the Vulnerability Assessment and Penetration Testing (VAPT) method, which combines two forms of vulnerability testing to achieve a much more complete vulnerability analysis by performing different tasks in the same focus area. The vulnerability assessment uses the Common Vulnerability Scoring System (CVSS) method. The resu
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "CVSS score"

1

Cheng, Pengsu. "A Multi-Faceted Approach to Network Security Metric through Combining CVSS Base Scores." Thesis, 2011. http://spectrum.library.concordia.ca/35769/1/Cheng_MASc_F2011.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "CVSS score"

1

Younis, Awad, Yashwant K. Malaiya, and Indrajit Ray. "Evaluating CVSS Base Score Using Vulnerability Rewards Programs." In ICT Systems Security and Privacy Protection. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-33630-5_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Mohsen, Fadi, Adel Shtayyeh, Riham Naser, Lena Mohammad, and Marten Struijk. "Extending the Exposure Score of Web Browsers by Incorporating CVSS." In Lecture Notes in Computer Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-02067-4_12.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Nowak, Maciej, Michał Walkowski, and Sławomir Sujecki. "Machine Learning Algorithms for Conversion of CVSS Base Score from 2.0 to 3.x." In Computational Science – ICCS 2021. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77967-2_21.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Cheng, Pengsu, Lingyu Wang, Sushil Jajodia, and Anoop Singhal. "Refining CVSS-Based Network Security Metrics by Examining the Base Scores." In Network Security Metrics. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66505-4_2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Frigault, Marcel, Lingyu Wang, Sushil Jajodia, and Anoop Singhal. "Measuring the Overall Network Security by Combining CVSS Scores Based on Attack Graphs and Bayesian Networks." In Network Security Metrics. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66505-4_1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Njarui, D. M. G., M. Gatheru, and S. R. Ghimire. "Brachiaria Grass for Climate Resilient and Sustainable Livestock Production in Kenya." In African Handbook of Climate Change Adaptation. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-45106-6_146.

Pełny tekst źródła
Streszczenie:
AbstractBrachiaria grass is a “climate smart” forage that produces high amount of palatable and nutritious biomass for livestock and performs well in infertile soils, sequesters carbon in soil, and provides several environmental benefits. The objective of the study was to validate the productivity of Brachiaria grass and upscale the suitable cultivars for improved livestock feed resources in Kenya. We assume integrating Brachiaria grass into mixed crop-livestock system will enhance feed availability and livestock productivity, leading to increased food and nutrition security. Farmer participat
Style APA, Harvard, Vancouver, ISO itp.
7

Watkins, Lanier, and John S. Hurley. "The Next Generation of Scientific-Based Risk Metrics." In Cyber Warfare and Terrorism. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch099.

Pełny tekst źródła
Streszczenie:
One of the major challenges to an organization achieving a certain level of preparedness to “effectively” combat existing and future cyber threats and vulnerabilities is its ability to ensure the security and reliability of its networks. Most of the existing efforts are quantitative, by nature, and limited solely to the networks and systems of the organization. It would be unfair to not acknowledge that for sure some progress has been achieved in the way that organizations, as a whole, are now positioning themselves to address the threats (GAO 2012). Unfortunately, so have the skill sets and r
Style APA, Harvard, Vancouver, ISO itp.
8

Gandham, Sreedevi, Ghali EN Hanuma Kumar, and Balaji Meriga. "Nutraceuticals: The Potential Agents to Rescue Human Race from Cardiovascular Diseases (CVDs)." In Advancements in Cardiovascular Research and Therapeutics: Molecular and Nutraceutical Perspectives. BENTHAM SCIENCE PUBLISHERS, 2022. http://dx.doi.org/10.2174/9789815050837122010010.

Pełny tekst źródła
Streszczenie:
Cardiovascular disease(CVD) is the foremost global health problem that accounts for the highest rate of morbidity, mortality and huge healthcare costs. Food habits and lifestyles predominantly affect the functioning of the cardiovascular system either directly or indirectly through risk factors like hypertension, obesity, dyslipidemia, diabetes, etc. Decreased physical activity, increased sedentariness, and growing fast food culture are some of the apparent reasons that make the disease impact more on the younger generation. Several plant species have been reported in ethnomedicine for their t
Style APA, Harvard, Vancouver, ISO itp.
9

Sanjeevraddi. M. Satyaraddi, Preetham D, and Manimozhi R. "APACHE LOG4J VULNERABILITY." In INFORMATION TECHNOLOGY & BIOINFORMATICS: INTERNATIONAL CONFERENCE ON ADVANCE IT, ENGINEERING AND MANAGEMENT - SACAIM-2022 (VOL 1). REDSHINE India, 2020. http://dx.doi.org/10.25215/8119070682.06.

Pełny tekst źródła
Streszczenie:
Apache Log4j2 is a widely used logging library for Java-based applications. In December 2021, several critical and severe software vulnerabilities, including CVE-2021-44228, were publicly disclosed, allowing remote code execution (RCE) and denial of service (DoS) attacks. To date, these vulnerabilities are considered critical and the consequences of their disclosure are far-reaching. The vulnerabilities potentially affect a wide range of Internet-of-Things (IoT) devices, embedded devices, and cyber-physical systems. In this paper, we explore the fundamental concepts of log4j and when these vul
Style APA, Harvard, Vancouver, ISO itp.
10

Liu, Wenming, Rui Zhai, and Fang Zuo. "A Vulnerability Threat Assessment Model Based on Bayesian Networks." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2023. http://dx.doi.org/10.3233/faia230850.

Pełny tekst źródła
Streszczenie:
A The integration of information and network technology into industries has led to the widespread use of software. Unfortunately, these software designs may contain defects and vulnerabilities pose risks that could endanger safety. To ensure safety, it is essential to assess and analyze software vulnerabilities and implement adequate security measures. However, existing vulnerability assessment models cannot measure the severity of industrial software vulnerabilities which pose a significant challenge. To overcome this issue, a vulnerability threat assessment model for industrial software is p
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "CVSS score"

1

Miranda, Lucas, Lucas Senos, Daniel Menasché, et al. "Learning CNA-Oriented CVSS Scores." In 2024 IEEE 13th International Conference on Cloud Networking (CloudNet). IEEE, 2024. https://doi.org/10.1109/cloudnet62863.2024.10815736.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Miranda, Lucas, Lucas Senos, Daniel Menasché, et al. "A Product-Oriented Assessment of Vulnerability Severity Through NVD CVSS Scores." In 2025 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2025. https://doi.org/10.1109/icnc64010.2025.10994117.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Li, Han, Rongrong Xi, and Li Zhao. "Study on the distribution of CVSS environmental score." In 2015 5th International Conference on Electronics Information and Emergency Communication (ICEIEC). IEEE, 2015. http://dx.doi.org/10.1109/iceiec.2015.7284502.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Nowak, Maciej, Michal Walkowski, and Slawomir Sujecki. "Conversion of CVSS Base Score from 2.0 to 3.1." In 2021 International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2021. http://dx.doi.org/10.23919/softcom52868.2021.9559092.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Vasireddy, Dinesh T., Dakota S. Dale, and Qinghua Li. "CVSS Base Score Prediction Using an Optimized Machine Learning Scheme." In 2023 Resilience Week (RWS). IEEE, 2023. http://dx.doi.org/10.1109/rws58133.2023.10284627.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Zhang, Siqi, Minjie Cai, Mengyuan Zhang, Lianying Zhao, and Xavier de Carné de Carnavalet. "The Flaw Within: Identifying CVSS Score Discrepancies in the NVD." In 2023 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, 2023. http://dx.doi.org/10.1109/cloudcom59040.2023.00039.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Vasilyev, Vladimir, Anastasia Kirillova, Alexey Vulfin, and Andrey Nikonov. "Cybersecurity Risk Assessment Based on Cognitive Attack Vector Modeling with CVSS Score." In 2021 International Conference on Information Technology and Nanotechnology (ITNT). IEEE, 2021. http://dx.doi.org/10.1109/itnt52450.2021.9649191.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Balsam, Artur, Michał Walkowski, Maciej Nowak, Jacek Oko, and Sławomir Sujecki. "Automated Calculation of CVSS v3.1 Temporal Score Based on Apache Log4j 2021 Vulnerabilities." In 2023 International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2023. http://dx.doi.org/10.23919/softcom58365.2023.10271671.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Rao, Parimi Mastan, and Prof Shekar Babu. "Prioritize Software Vulnerabilities by Classifying based on the CVSS score and Textual Description." In 1st Indian International Conference on Industrial Engineering and Operations Management. IEOM Society International, 2021. http://dx.doi.org/10.46254/in01.20210245.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Kioskli, Kitty, and Nineta Polemi. "Estimating Attackers’ Profiles Results in More Realistic Vulnerability Severity Scores." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002211.

Pełny tekst źródła
Streszczenie:
Digitalization is moving at an increasing speed in all sectors of the economy. Along with it the cybersecurity threats and attacks continue to rise rapidly. Enterprises in all economic sectors are imposed to constantly assess the vulnerabilities (weaknesses) of their Information and Communication Systems (ICT) and further estimate their severity, to avoid exploitability by targeted cyber-attacks. Attacks may have catastrophic consequences (impacts), including the disruption or termination of operations, economic damages, long-term damaged reputation, customer loss, lawsuits, and fines. Organis
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "CVSS score"

1

A, Bengolea, García D, Balaciano G, Donato M, Donato M, and Iusef N. Alternativas farmacológicas para el tratamiento de pacientes con atrofia medular espinal. Epistemonikos Interactive Evidence Synthesis, 2024. http://dx.doi.org/10.30846/ies.dc6f192c69.

Pełny tekst źródła
Streszczenie:
Objetivo El objetivo de esta revisión sistemática es evaluar el efecto de distintas alternativas terapéuticas (Nusinersen, Risdiplam, Onasemnogene Abeparvovec o su combinación) o su combinación, en el tratamiento de pacientes con atrofia medular espinal tipo 1, 2, 3 y 4. Métodos Se incluyeron ensayos clínicos aleatorizados y estudios observacionales que evaluaron el efecto de Nusinersen, Risdiplam, Onasemnogene Abeparvovec o su combinación. Se realizó una búsqueda amplia en la base de datos Epistemonikos, la cuál se construye mediante búsquedas periódicas en las siguientes fuentes para revisio
Style APA, Harvard, Vancouver, ISO itp.
2

A, Bengolea, García D, Balaciano G, Donato M, Donato M, and Iusef N. Alternativas farmacológicas para el tratamiento de pacientes con atrofia medular espinal. Epistemonikos Interactive Evidence Synthesis, 2023. http://dx.doi.org/10.30846/ies.dc6f192c69.v1.

Pełny tekst źródła
Streszczenie:
Objetivo El objetivo de esta revisión sistemática es evaluar el efecto de distintas alternativas terapéuticas (Nusinersen, Risdiplam, Onasemnogene Abeparvovec o su combinación) o su combinación, en el tratamiento de pacientes con atrofia medular espinal tipo 1, 2, 3 y 4. Métodos Se incluyeron ensayos clínicos aleatorizados y estudios observacionales que evaluaron el efecto de Nusinersen, Risdiplam, Onasemnogene Abeparvovec o su combinación. Se realizó una búsqueda amplia en la base de datos Epistemonikos, la cuál se construye mediante búsquedas periódicas en las siguientes fuentes para revisio
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!