researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Inf. Sec. Techn. Report
Home
Index
Info
Issue
Volume
8
, Issue
4
5
--
0
Chez Ciechanowicz
.
Introduction
6
--
13
Glenn Gunara-Chen
.
The art of intrusion testing
14
--
25
Andrew Blyth
.
An XML-based architecture to perform data integration and data unification in vulnerability assessments
26
--
33
Gerhard Eschelbeck
,
Michael Krieger
.
Eliminating noise from intrusion detection systems
34
--
44
Andy Gray
.
An historical perspective of software vulnerability management
45
--
55
Evangelos Morakis
,
Stilianos Vidalis
,
Andrew Blyth
.
Measuring vulnerabilities and their exploitation cycle
56
--
64
Neil Barrett
.
Penetration testing and social engineering: Hacking the weakest link
65
--
77
Paul Midian
.
How to ensure an effective penetration test
78
--
84
Stein Mollerhaug
.
Useful vulnerability assessment