Cargando…
Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases
Proactive security plays a vital role in preventing the attack before entering active mode. In the modern information environment, it depends on the vulnerability management practitioners of an organization in which the critical factor is the prioritization of threats. The existing models and method...
Autores principales: | Sharma, Gaurav, Vidalis, Stilianos, Menon, Catherine, Anand, Niharika |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer US
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9628632/ https://www.ncbi.nlm.nih.gov/pubmed/36339055 http://dx.doi.org/10.1007/s11042-022-14036-y |
Ejemplares similares
-
The NIST Quantitative Infrared Database
por: Chu, P. M., et al.
Publicado: (1999) -
NIST Crystallographic Databases for Research and Analysis
por: Mighell, Alan D., et al.
Publicado: (1996) -
NIST Ballistics Toolmark Research Database
por: Zheng, Xiaoyu, et al.
Publicado: (2020) -
Macromolecular Crystallography and Structural Biology Databases at NIST
por: Gilliland, Gary L.
Publicado: (2001) -
NIST Materials Properties Databases for Advanced Ceramics
por: Munro, R. G.
Publicado: (2001)