The ever-evolving capabilities of cyber attackers force security administrators to focus on the early identification of emerging threats. Targeted cyber attacks usually consist of several …
In this paper, we present an empirical study on vulnerability enumeration in computer networks using common network probing and monitoring tools. We conducted active …
G Blasilli, E De Paoli, S Lenti, S Picca - EuroVA@ EuroVis, 2021 - diglib.eg.org
The increasing number of cyberattacks against critical infrastructures has pushed researchers to develop many Visual Analytics solutions to provide valid defensive …
The rising complexity of today's communications networks and information systems calls for automated systems that would help the operator achieve a cyber situational awareness and …
Large-scale networks consisting of thousands of connected devices are like living organisms, constantly changing and evolving. It is challenging for a human administrator to …
In this bachelor's thesis, we propose a way how to categorize an effect of a vulnerability exploit based on the vulnerability data from the National Vulnerability Database. At first, we …