Inicio  /  Applied Sciences  /  Vol: 10 Par: 21 (2020)  /  Artículo
ARTÍCULO
TITULO

Efficient Algorithm for Providing Live Vulnerability Assessment in Corporate Network Environment

Michal Walkowski    
Maciej Krakowiak    
Jacek Oko and Slawomir Sujecki    

Resumen

Vulnerability management center allows for the improvement of the quality and efficiency of operation for security operation centers.

 Artículos similares

       
 
Wenxiao Cao, Guoming Li, Hongfei Song, Boyu Quan and Zilu Liu    
Water control of grain has always been a crucial link in storage and transportation. The resistance method is considered an effective technique for quickly detecting moisture in grains, making it particularly valuable in practical applications at drying ... ver más
Revista: Applied Sciences

 
Zihao Zhu and Yonghua Xie    
Black soil plays an important role in maintaining a healthy ecosystem, promoting high-yield and efficient agricultural production, and conserving soil resources. In this paper, a typical black soil area of Keshan Farm in Qiqihar City, Heilongjiang Provin... ver más
Revista: Applied Sciences

 
Qingyong Zhang, Changhuan Song and Yiqing Yuan    
Vehicle gearboxes are subject to strong noise interference during operation, and the noise in the signal affects the accuracy of fault identification. Signal denoising and fault diagnosis processes are often conducted independently, overlooking their syn... ver más
Revista: Applied Sciences

 
Eunkyu Lee, Junaid Khan, Umar Zaman, Jaebin Ku, Sanha Kim and Kyungsup Kim    
With the global advancement of maritime autonomous surface ships (MASS), the critical task of verifying their key technologies, particularly in challenging conditions, becomes paramount. This study introduces a synthetic maritime traffic generation syste... ver más
Revista: Applied Sciences

 
Burhan Ul Islam Khan, Khang Wen Goh, Mohammad Shuaib Mir, Nur Fatin Liyana Mohd Rosely, Aabid Ahmad Mir and Mesith Chaimanee    
As the Internet of Things (IoT) continues to revolutionize value-added services, its conventional architecture exhibits persistent scalability and security vulnerabilities, jeopardizing the trustworthiness of IoT-based services. These architectural limit... ver más
Revista: Information