Open Access

An improvement for a mathematical model for distributed vulnerability assessment


Cite

[1] M. T. Chapman, Establishing metrics to manage the human layer, ISSA Security Education Awareness Special Interest Group, 2013.Search in Google Scholar

[2] M. T. Chapman, Advanced Persistent Testing: How to fight bad phishing with good, PhishLine, 2015. http://www.phishline.com/advanced-persistent-testing-ebookSearch in Google Scholar

[3] S. E. Edwards, R. Ford, G. Szappanos, Effectively testing APT defenses, Virus Bulletin Conference, Prague, Czech Republic, 2015.Search in Google Scholar

[4] K. Hadarics, K. Györffy, B. Nagy, L. Bognár, A. Arrott, F. Leitold, Mathematical Model of Distributed Vulnerability Assessment, In: Jaroslav Dočkal, Milan Jirsa, Josef Kaderka, Proceedings of Conference SPI 2017: Security and Protection of Information. Brno, 2017.07.01-2017.07.02. Brno: University of Defence, (2017), 45–57. (ISBN:978-80-7231-414-0)Search in Google Scholar

[5] F. Lalonde Levesque, J. M. Fernandez, A. Somayaji, Risk prediction of malware victimization based on user behavior, Malicious and Unwanted Software: The Americas (MALWARE), 2014 9th International Conference on. IEEE, 2014.10.1109/MALWARE.2014.6999412Search in Google Scholar

[6] F. Leitold, A. Arrott, K. Hadarics, Quantifying cyber-threat vulnerability by combining threat intelligence, IT infrastructure weakness, and user susceptibility, 24th Annual EICAR Conference, Nuremberg, Germany, 2016.Search in Google Scholar

[7] F. Leitold, K. Hadarics, Measuring security risk in the cloud-enabled enterprise, In: Dr Fernando C Colon Osorio, 7th International Conference on Malicious and Unwanted Software (MALWARE), Fajardo, Puerto Rico, 2012.10.16-2012.10.18. Piscataway (NJ): IEEE, (2012), 62–66. (ISBN:978-1-4673-4880-5)Search in Google Scholar

[8] NIST SP 800-53r4 Security and Privacy Controls for Federal Information Systems and Organizations, 2013.Search in Google Scholar

[9] NIST SP 800-83r1 Guide to Malware Incident Prevention and Handling for Desktops and Laptops, 2013.Search in Google Scholar

[10] Pwnie Express, Vulnerability assessment and penetration testing across the enterprise, Whitepaper, 2014. http://www.pwnieexpress.comSearch in Google Scholar

eISSN:
2066-7752
Language:
English
Publication timeframe:
2 times per year
Journal Subjects:
Mathematics, General Mathematics