Vulnerability Selection for Remediation: An Empirical Analysis (English)
- New search for: Shah, Ankit
- Further information on Shah, Ankit:
- https://orcid.org/0000-0002-8314-6392
- New search for: Farris, Katheryn A.
- New search for: Ganesan, Rajesh
- New search for: Jajodia, Sushil
- New search for: Shah, Ankit
- Further information on Shah, Ankit:
- https://orcid.org/0000-0002-8314-6392
- New search for: Farris, Katheryn A.
- New search for: Ganesan, Rajesh
- New search for: Jajodia, Sushil
In:
The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology
;
19
, 1
;
13-22
;
2022
- Article (Journal) / Electronic Resource
-
Title:Vulnerability Selection for Remediation: An Empirical Analysis
-
Contributors:Shah, Ankit ( author ) / Farris, Katheryn A. ( author ) / Ganesan, Rajesh ( author ) / Jajodia, Sushil ( author )
-
Published in:
-
Publisher:
- New search for: SAGE Publications
-
Publication date:2022-01-01
-
Size:10 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 19, Issue 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Cyber risk and vulnerability estimationCam, Hasan et al. | 2022
- 5
-
Complexity and mission computability of adaptive computing systemsDasari, Venkat R / Im, Mee Seong / Geerhart, Billy et al. | 2022
- 13
-
Vulnerability Selection for Remediation: An Empirical AnalysisShah, Ankit / Farris, Katheryn A. / Ganesan, Rajesh / Jajodia, Sushil et al. | 2022
- 23
-
Cybersecurity threats and experimental testbed for a generator systemWerth, Aaron W / Griffith, SueAnne N / Hairston, Jesse R / Morris, Thomas H et al. | 2022
- 37
-
Estimation of cyber network risk using rare event simulationKrall, Alexander L / Kuhl, Michael E / Yang, Shanchieh J et al. | 2022
- 57
-
Machine learning in cybersecurity: a comprehensive surveyDasgupta, Dipankar / Akhtar, Zahid / Sen, Sajib et al. | 2022
- 107
-
Agent-based target evaluation and fire doctrine: an aspect-oriented programming viewHocaoğlu, Mehmet Fatih et al. | 2022