2016 IEEE 8th International Conference on Intelligent Systems (IS) 2016
DOI: 10.1109/is.2016.7737482
|View full text |Cite
|
Sign up to set email alerts
|

A measurement process model implemented by generalized net

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…The presented network scan techniques in Bulgarian Defense Institute can be used in order to be detected open unprotected network ports. In relation to this the chief information security officers will be able to take timely measures to implement protective mechanisms and policies for the protection of the information resources containing critical and confidential information about data centers in defense and security, jamming devices, bullets, ammunitions, projectiles, rocket motors and ballistic materials [2,14,15,16,17,18,21,22,23,31].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The presented network scan techniques in Bulgarian Defense Institute can be used in order to be detected open unprotected network ports. In relation to this the chief information security officers will be able to take timely measures to implement protective mechanisms and policies for the protection of the information resources containing critical and confidential information about data centers in defense and security, jamming devices, bullets, ammunitions, projectiles, rocket motors and ballistic materials [2,14,15,16,17,18,21,22,23,31].…”
Section: Resultsmentioning
confidence: 99%
“…The goal of network scanning is to discover exploitable communication channels, examine as many listeners as possible, and track down those that are responsive or useful to the hacker's particular needs. In the scanning phase of a cyberattack, the attacker tries to find different ways to penetrate the target system [26,27,28,29,31]. The attacker also tries to discover more information about the target system to determine the presence of configuration gaps.…”
Section: Introductionmentioning
confidence: 99%
“…The presented modified network port scanner for Windows based operating systems in Bulgarian Defense Institute can be used in order to be detected open unprotected network ports. In relation to this the chief information security officers will be able to take timely measures to implement protective mechanisms and policies for the protection of the information resources containing critical and confidential information about data centers in defense and security, jamming devices, bullets, ammunitions, projectiles, rocket motors and ballistic materials [1,2,15,16,17,18,19,20,21,22,27,31,32].…”
Section: Methodsmentioning
confidence: 99%
“…-Damages the reputation of a chosen victim, which can be a host, corporation, government institution, etc [1,3,4,7,9,14,15,21,22,23,24,28,30,31].…”
Section: Introductionmentioning
confidence: 99%
“…The presented modified script for Android based operating systems in Bulgarian Defense Institute can be used in order to be detected open unprotected network ports. In relation to this the chief information security officers will be able to take timely measures to implement protective mechanisms and policies for the protection of the information resources containing critical and confidential information about data centers in defense and security, jamming devices, bullets, ammunitions, projectiles, rocket motors and ballistic materials [15,16,17,18,19,20,21,22,23,25].…”
Section: Methodsmentioning
confidence: 99%