咨询与建议

限定检索结果

文献类型

  • 2 篇 期刊文献

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 计算机科学与技术...
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物医学工程(可授...
  • 1 篇 理学
    • 1 篇 数学

主题

  • 2 篇 vulnerability ma...
  • 1 篇 threat landscape
  • 1 篇 regulations
  • 1 篇 threat modeling
  • 1 篇 policy
  • 1 篇 threat intellige...
  • 1 篇 compliance
  • 1 篇 cyber-physical s...
  • 1 篇 threat actors
  • 1 篇 quantitative eva...
  • 1 篇 artificial intel...
  • 1 篇 security orchest...
  • 1 篇 cyberattacks
  • 1 篇 cyber resilience
  • 1 篇 privacy
  • 1 篇 data protection
  • 1 篇 threat detection
  • 1 篇 real-time threat...
  • 1 篇 critical infrast...
  • 1 篇 automation

机构

  • 1 篇 national univers...
  • 1 篇 university of br...
  • 1 篇 department of co...

作者

  • 1 篇 ragha madhavi go...
  • 1 篇 olatunde abiona
  • 1 篇 tiantian tan
  • 1 篇 baosheng wang
  • 1 篇 xu zhou
  • 1 篇 aparna gadhi
  • 1 篇 jingwen han
  • 1 篇 yong tang
  • 1 篇 hitendra chaudha...

语言

  • 2 篇 英文
检索条件"主题词=Vulnerability management"
2 条 记 录,以下是1-10 订阅
排序:
Cyber Resilience through Real-Time Threat Analysis in Information Security
收藏 引用
International Journal of Communications, Network and System Sciences 2024年 第4期17卷 51-67页
作者: Aparna Gadhi Ragha Madhavi Gondu Hitendra Chaudhary Olatunde Abiona Department of Computer Information Systems Indiana University Northwest Gary IN USA
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Method for vulnerability Database Quantitative Evaluation
收藏 引用
Computers, Materials & Continua 2019年 第9期61卷 1129-1144页
作者: Tiantian Tan Baosheng Wang Yong Tang Xu Zhou Jingwen Han National University of Defense Technology Deya villageChangshaChina University of British Columbia VancouverCanada
During system development,implementation and operation,vulnerability database technique is necessary to system security;there are many vulnerability databases but a lack of quality standardization and general evaluati... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论