2011 European Intelligence and Security Informatics Conference 2011
DOI: 10.1109/eisic.2011.39
|View full text |Cite
|
Sign up to set email alerts
|

Automation Possibilities in Information Security Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
15
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(16 citation statements)
references
References 4 publications
0
15
0
Order By: Relevance
“…The National Institute of Standards and Technology (NIST) in cooperation with the Massachusetts Institute of Technology Research Establishment (MITRE) provide the Security Content Automation Protocol (SCAP), a multipurpose approach which enables e.g. automated vulnerability checking employing security configuration checklists [29]. SCAP content benefits from multiple sources, among them the National Vulnerability Database (NVD) or the MITRE Open Vulnerability and Assessment Language (OVAL) Database [30].…”
Section: Related Workmentioning
confidence: 99%
“…The National Institute of Standards and Technology (NIST) in cooperation with the Massachusetts Institute of Technology Research Establishment (MITRE) provide the Security Content Automation Protocol (SCAP), a multipurpose approach which enables e.g. automated vulnerability checking employing security configuration checklists [29]. SCAP content benefits from multiple sources, among them the National Vulnerability Database (NVD) or the MITRE Open Vulnerability and Assessment Language (OVAL) Database [30].…”
Section: Related Workmentioning
confidence: 99%
“…It does so by focusing on increasing the contribution of f (2) , while not to decreasing the results of f (1) and f (3) . Due to this, the goal distribution of Pareto-Q-learning falls well short of the desired 3:7:2 goal prioritization.…”
Section: Figurementioning
confidence: 99%
“…From Figures 3-5, we can see that all the algorithms start with an unfavorable distribution of the goals. Both STOM and GUESS aggressively react by decreasing the results for goals f (1) and f (3) and increasing the result for f (2) , until the algorithm reaches a goal distribution that matches the set goal prioritization of 3:7:2. The GUESS method slightly outperforms the STOM method.…”
Section: Figurementioning
confidence: 99%
See 1 more Smart Citation
“…The software will be planned as simple and user friendly. Security aspects must be taken in to account when designing the software [7]. There must be specialized security applications to ensure a safe and automatic control of the school.…”
mentioning
confidence: 99%