Information Security and Ethics
DOI: 10.4018/9781599049373.ch244
|View full text |Cite
|
Sign up to set email alerts
|

Security Vulnerabilities and Exposures in Internet Systems and Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Intelligent agents and multi-agent systems are among the most rapidly growing areas of research and development. Vulnerability assessment and intrusion detection based on agent approach are discussed in (Cardoso & Freire, 2005). Multi-agent framework design and implementation issues for the autonomous database administration system and security are described in (Ramanujan & Capretez, 2005).…”
Section: Artificial Intelligence Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…Intelligent agents and multi-agent systems are among the most rapidly growing areas of research and development. Vulnerability assessment and intrusion detection based on agent approach are discussed in (Cardoso & Freire, 2005). Multi-agent framework design and implementation issues for the autonomous database administration system and security are described in (Ramanujan & Capretez, 2005).…”
Section: Artificial Intelligence Techniquesmentioning
confidence: 99%
“…They need systems that support optimal allocation of limited security resources on the basis of predicted risk rather than perceived vulnerabilities. However, the security infrastructure of most organizations came about through necessity rather than planning, a reactive-based approach such as detection of vulnerabilities and applying software updates (Cardoso & Freire, 2005) as opposed to a proactive approach (Gordon, Loeb & Lucyshyn, 2003). On the other hand, cyber security plans call for more specific requirements for computer and network security as well as emphasis on the availability of commercial automated auditing and reporting mechanisms and promotion of products for security assessments and threat management (Chan & Perrig, 2003;Hwang, Tzeng & Tsai, 2003;Leighton, 2004).…”
Section: Cyber Security Overviewmentioning
confidence: 99%