Detection of operating system vulnerabilities and network traffic analysis methods
Researchers and experts on information protection develop antivirus programs and applications to improve the security of operating systems and security policies. Threats will be relevant to organizations that do not consider security policies and regular software updates. This paper discusses applic...
Main Authors: | Makulova, A., Sharipova, B., Othman, M., Pyrkova, A., Оrdabayeva, G. |
---|---|
Format: | Article |
Language: | English |
Published: |
Al-farabi Kazakh State National University
2024
|
Online Access: | http://psasir.upm.edu.my/id/eprint/113401/1/113401.pdf |
Similar Items
-
Information Technology Systems Vulnerabilities Detecting based on Network’s Traffic Analysis
by: Dmitry Anatolevich Melnikov, et al.
Published: (2013-12-01) -
Automatic detection method of software upgrade vulnerability based on network traffic analysis
by: TENG Jinhui, GUANG Yan, SHU Hui, ZHANG Bing
Published: (2020-02-01) -
TRANSPORT NETWORK VULNERABILITY ANALYSIS BASED ON TRAFFIC ASSIGNMENT METHODS
by: Miroslav Slivoně
Published: (2010-12-01) -
Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.
by: Shameng Wen, et al.
Published: (2017-01-01) -
Vulnerability of Transportation Networks to Traffic-Signal Tampering
by: Laszka, Aron, et al.
Published: (2017)