Search Results - "attack surface"

Refine Results
  1. 1
  2. 2
  3. 3

    Approaches to determining the attack surface for fuzzing the Linux kernel by Teplyuk Pavel, Yakunin Aleksey

    Published in E3S Web of Conferences (2024-01-01)
    “…The purpose of the study was to analyze possible methods for determining the attack surface in relation to solving the problem of fuzzing testing the kernel of operating systems of the Linux family and to select the most suitable one. …”
    Get full text
    Article
  4. 4
  5. 5

    Effectiveness Evaluation Model of Moving Target Defense Based on System Attack Surface by Xin-Li Xiong, Lin Yang, Guang-Sheng Zhao

    Published in IEEE Access (2019-01-01)
    “…Besides, it converts all the attack and defense actions into the process, and interactivities are evaluated by system view extended attack surface model. Previously, the proposed attack surface models are not concerned about the links between nodes and vulnerabilities affected by topologies. …”
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Designing Attack Surface in Early Childhood Education System Environment using Risk Assessment and Enterprise Architecture Approach by Dadang Setiawan, Dita Oktaria, Sidik Prabowo, Elizabeth Sastrina Indrasari

    Published in Sistemasi: Jurnal Sistem Informasi (2024-11-01)
    “…This research addresses the challenge of securing Indonesia’s early childhood education systems by designing a minimized attack surface through the integration of ISO 27005-based risk assessment and the TOGAF enterprise architecture framework. …”
    Get full text
    Article
  18. 18
  19. 19
  20. 20

Search Tools: