Have a personal or library account? Click to login
An improvement for a mathematical model for distributed vulnerability assessment Cover

An improvement for a mathematical model for distributed vulnerability assessment

Open Access
|Mar 2019

References

  1. [1] M. T. Chapman, Establishing metrics to manage the human layer, ISSA Security Education Awareness Special Interest Group, 2013.
  2. [2] M. T. Chapman, Advanced Persistent Testing: How to fight bad phishing with good, PhishLine, 2015. http://www.phishline.com/advanced-persistent-testing-ebook
  3. [3] S. E. Edwards, R. Ford, G. Szappanos, Effectively testing APT defenses, Virus Bulletin Conference, Prague, Czech Republic, 2015.
  4. [4] K. Hadarics, K. Györffy, B. Nagy, L. Bognár, A. Arrott, F. Leitold, Mathematical Model of Distributed Vulnerability Assessment, In: Jaroslav Dočkal, Milan Jirsa, Josef Kaderka, Proceedings of Conference SPI 2017: Security and Protection of Information. Brno, 2017.07.01-2017.07.02. Brno: University of Defence, (2017), 45–57. (ISBN:978-80-7231-414-0)
  5. [5] F. Lalonde Levesque, J. M. Fernandez, A. Somayaji, Risk prediction of malware victimization based on user behavior, Malicious and Unwanted Software: The Americas (MALWARE), 2014 9th International Conference on. IEEE, 2014.10.1109/MALWARE.2014.6999412
  6. [6] F. Leitold, A. Arrott, K. Hadarics, Quantifying cyber-threat vulnerability by combining threat intelligence, IT infrastructure weakness, and user susceptibility, 24th Annual EICAR Conference, Nuremberg, Germany, 2016.
  7. [7] F. Leitold, K. Hadarics, Measuring security risk in the cloud-enabled enterprise, In: Dr Fernando C Colon Osorio, 7th International Conference on Malicious and Unwanted Software (MALWARE), Fajardo, Puerto Rico, 2012.10.16-2012.10.18. Piscataway (NJ): IEEE, (2012), 62–66. (ISBN:978-1-4673-4880-5)
  8. [8] NIST SP 800-53r4 Security and Privacy Controls for Federal Information Systems and Organizations, 2013.
  9. [9] NIST SP 800-83r1 Guide to Malware Incident Prevention and Handling for Desktops and Laptops, 2013.
  10. [10] Pwnie Express, Vulnerability assessment and penetration testing across the enterprise, Whitepaper, 2014. http://www.pwnieexpress.com
Language: English
Page range: 203 - 217
Submitted on: Jan 7, 2018
|
Published on: Mar 4, 2019
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2019 László Bognár, Antal Jóos, Bálint Nagy, published by Sapientia Hungarian University of Transylvania
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.