National Vulnerability Database

Results: 57



#Item
51Computer network security / Risk / CVSS / Software testing / Vulnerability / Social vulnerability / Countermeasure / National Vulnerability Database / Zero-day attack / Computer security / Cyberwarfare / Security

Predictive Vulnerability Scoring in the Context of Insufficient Information Availability Hamza Ghani, Jesus Luna, Abdelmajid Khelil, Najib Alkadri, Neeraj Suri Technische Universit¨at Darmstadt, Germany {ghani, jluna, k

Add to Reading List

Source URL: www1.deeds.informatik.tu-darmstadt.de

Language: English - Date: 2013-09-23 05:44:28
52Computer network security / Crime prevention / National security / Data security / Xcon / Vulnerability / Application security / Information security / Database security / Security / Computer security / Cyberwarfare

XCon 2014 XFocus Information Security Conference Call for Paper August, 20th –21st , 2014, Beijing, China (http://xcon.xfocus.net) Upholding rigorous work style, XCon sincerely welcomes contributions from information s

Add to Reading List

Source URL: xcon.xfocus.org

Language: English - Date: 2014-03-17 05:16:41
53Extensible Configuration Checklist Description Format / Federal Information Security Management Act / National Vulnerability Database / Angela Orebaugh / NIST Special Publication 800-53 / HTML / National Institute of Standards and Technology / Specification / Open Vulnerability and Assessment Language / Computer security / Computing / Security Content Automation Protocol

NIST SP[removed]Revision 1, The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 17:09:01
54Computer network security / Data security / Crime prevention / National security / Application security / Database security / Information security / Vulnerability / Security controls / Computer security / Security / Cyberwarfare

08FNS_FishNetSecurity_logo

Add to Reading List

Source URL: www.fishnetsecurity.com

Language: English - Date: 2013-09-17 11:35:14
55Security Content Automation Protocol / National Vulnerability Database / Information Security Automation Program / Federal Information Security Management Act / Extensible Configuration Checklist Description Format / Vulnerability / NIST Special Publication 800-53 / Information security management system / Security controls / Computer security / Security / Cyberwarfare

Information Security Automation Program Automating Vulnerability Management, Security Measurement, and Compliance

Add to Reading List

Source URL: nvd.nist.gov

Language: English - Date: 2012-07-31 09:53:44
56Security / Technology / Extensible Configuration Checklist Description Format / Federal Information Security Management Act / National Vulnerability Database / Angela Orebaugh / Specification / Portable Document Format / Open Vulnerability and Assessment Language / Computer security / Computing / Security Content Automation Protocol

NIST SP[removed]Revision 2, The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 17:12:26
57Security Content Automation Protocol / Extensible Configuration Checklist Description Format / Federal Information Security Management Act / National Vulnerability Database / Angela Orebaugh / Open Vulnerability and Assessment Language / XML / Portable Document Format / National Information Exchange Model / Computing / Computer security / Information

NIST SP[removed], The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.0

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 17:04:50
UPDATE