Анализ уязвимостей вычислительных систем на основе алгебраических структур и потоков данных National Vulnerability Database
Citations
634 citations
Cites methods from "Анализ уязвимостей вычислительных с..."
...We used the National Vulnerability Database (NVD) bulletins to decide whether a patch is relevant [31]....
[...]
317 citations
Cites background or methods from "Анализ уязвимостей вычислительных с..."
...According to the OpenFlow protocol [20], when the controller receives the first packet of a flow, it holds the packet and checks the flow table for complying traffic policies....
[...]
...The optimal countermeasure selection is a multiobjective optimization problem, to calculate MIN(impact, cost) and MAX(benefit)....
[...]
250 citations
207 citations
Cites background from "Анализ уязвимостей вычислительных с..."
...problem, hypervisors like Xen [7], have been shown to exhibit a number of critical vulnerabilities [39]....
[...]
189 citations
Cites background from "Анализ уязвимостей вычислительных с..."
...INTRODUCTION Virtual Machines (VMs) have become commonplace in modern computing, as they enable the execution of multiple isolated Operating System instances on a single physical machine....
[...]
References
634 citations
317 citations
250 citations
207 citations
189 citations