Mostrando 2 resultados de: 2
Filtros aplicados
Área temáticas
Ciencia militar(1)
Ciencias de la computación(1)
Funcionamiento de bibliotecas y archivos(1)
Programación informática, programas, datos, seguridad(1)
Año de Publicación
2022(2)
Origen
google(2)
Development Processes of Vulnerability Detection Systems: A Systematic Review, Approaches, Challenges, and Future Directions
Conference ObjectAbstract: In cybersecurity, a vulnerability is any software or hardware failure that compromises the informatiPalabras claves:Software development process, Threat assessment, Vulnerability detection, Vulnerability scanningAutores:Jorge Reyes, Mayra MacAs, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusAn Environment-Specific Prioritization Model for Information-Security Vulnerabilities Based on Risk Factor Analysis
ArticleAbstract: Vulnerabilities represent a constant and growing risk for organizations. Their successful exploitatiPalabras claves:prioritization model, probability theory, risk factor, SHODAN, Vulnerability detection, Vulnerability scanningAutores:Jorge Reyes, Mayra MacAs, Paco Arévalo, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus