2011 7th International Conference on Information Assurance and Security (IAS) 2011
DOI: 10.1109/isias.2011.6122789
|View full text |Cite
|
Sign up to set email alerts
|

Understanding vulnerabilities by refining taxonomy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…In addition, continuing with the application of the snowball technique [25] to the conceptual models indicated in the previous articles, the following conceptual models of ontologies and taxonomies have been considered for this proposal: [26], focused on asset ontologies per user; [27], focused on asset ontologies; [28], paper focused on taxonomy of impacts on assets; [29], focused on mobile asset taxonomy; [30], focused on threat taxonomy; [31], focused on taxonomy of voice over IP threats; [32], focused on attack ontology; [33], focused on attack taxonomy; [34], focused on vulnerability taxonomy; [35], focused on vulnerability taxonomy based on information attributes; [36], paper focused on vulnerability taxonomy; and [37], focused on vulnerability taxonomy.…”
Section: Contextmentioning
confidence: 99%
“…In addition, continuing with the application of the snowball technique [25] to the conceptual models indicated in the previous articles, the following conceptual models of ontologies and taxonomies have been considered for this proposal: [26], focused on asset ontologies per user; [27], focused on asset ontologies; [28], paper focused on taxonomy of impacts on assets; [29], focused on mobile asset taxonomy; [30], focused on threat taxonomy; [31], focused on taxonomy of voice over IP threats; [32], focused on attack ontology; [33], focused on attack taxonomy; [34], focused on vulnerability taxonomy; [35], focused on vulnerability taxonomy based on information attributes; [36], paper focused on vulnerability taxonomy; and [37], focused on vulnerability taxonomy.…”
Section: Contextmentioning
confidence: 99%