Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions


如何引用文章

全文:

开放存取 开放存取
受限制的访问 ##reader.subscriptionAccessGranted##
受限制的访问 订阅存取

详细

The problem of automation of the process of detecting weaknesses in information systems based on the analysis of its vulnerabilities is solved. The input data used for the classification, the process of their preparation, and the classification results are described. The interpretation and analysis of the results are presented. The problem solved is a part of the approach proposed by the authors to automatic formation of a set of required security tools for a particular information system. A necessary set of security tools is determined by the set of possible threats.

作者简介

E. Doynikova

St. Petersburg Institute for Informatics and Automation, Russian Academy of Sciences

编辑信件的主要联系方式.
Email: elenadoynikova@mail.ru
俄罗斯联邦, St. Petersburg, 199178

A. Fedorchenko

St. Petersburg Institute for Informatics and Automation, Russian Academy of Sciences

Email: ivkote1@mail.ru
俄罗斯联邦, St. Petersburg, 199178

I. Kotenko

St. Petersburg Institute for Informatics and Automation, Russian Academy of Sciences

编辑信件的主要联系方式.
Email: ivkote1@mail.ru
俄罗斯联邦, St. Petersburg, 199178

补充文件

附件文件
动作
1. JATS XML

版权所有 © Allerton Press, Inc., 2019