2019
DOI: 10.1007/s11334-019-00337-3
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic vulnerability assessments of software-defined networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Likewise, Deb and Roy [16] present a mathematical implementation to identify the status of the different hosts on the network. On the other hand, Hu et al [17] propose two algorithms.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…Likewise, Deb and Roy [16] present a mathematical implementation to identify the status of the different hosts on the network. On the other hand, Hu et al [17] propose two algorithms.…”
Section: Discussionmentioning
confidence: 99%
“…Finally, our model takes CVSS as a reference point plus an additional analysis on the environment variables, which allows us to define a higher quality in the prioritization since the actual environment is analyzed. However, it is not enough to generate an adequate prioritization value that focuses on the technological infrastructure environment variables where vulnerabilities are identified [14,16,[53][54][55]. Thus, the studies that focused only on improving the CVSS model tend to be complex mathematical models that focus on adding variables that define and characterize vulnerability.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations