Common vulnerability scoring system (CVSS) is an industry standard that can assess the vulnerability of nodes in traditional computer systems. The metrics computed by CVSS would determine critical nodes and attack paths. However, traditional IT security models would not fit IoT embedded networks due to distinct nature and unique characteristics of IoT systems. This paper analyses the application of CVSS for IoT embedded systems and proposes an improved vulnerability scoring system based on CVSS v3 framework. The proposed framework, named CVSSIoT, is applied to a realistic IT supply chain system and the results are compared with the actual vulnerabilities from the national vulnerability database. The comparison result validates the proposed ...
With the inclusion of external software components in their software, vendors also need to identify ...
Internet and network security forms an interesting and topical, yet challenging and developing resea...
Assessing vulnerabilities supports analytics-based decision-making processes to protect Critical Inf...
Common vulnerability scoring system (CVSS) is an industry standard that can assess the vulnerability...
With the emergence of internet-based devices, the traditional industrial control system (ICS) networ...
Industrial Internet of Things (IIoT) is present in many participants from the energy, health, manufa...
While introducing unprecedented applications, Internet of Things (IoT) has simultaneously provoked a...
Part 8: Risk Analysis and Security MetricsInternational audienceAssessing the vulnerability of large...
The Common Vulnerability Scoring System is used for the evaluation of vulnerabilities. There is a st...
The development of cyber‐assured systems is a challenging task, particularly due to the cost and com...
With the inclusion of external software components in their software, vendors also need to identify ...
Internet of Things (IoT) has been deployed in a vast number of smart applications with the aim to br...
The Consumer Internet of Things (CIoT) is a term to describe everyday items connected to the intern...
Advances in Information Security book series (ADIS, volume 70): Cyber Threat IntelligenceVarious res...
With the increasing number and severity of security incidents and exploits, information technology (...
With the inclusion of external software components in their software, vendors also need to identify ...
Internet and network security forms an interesting and topical, yet challenging and developing resea...
Assessing vulnerabilities supports analytics-based decision-making processes to protect Critical Inf...
Common vulnerability scoring system (CVSS) is an industry standard that can assess the vulnerability...
With the emergence of internet-based devices, the traditional industrial control system (ICS) networ...
Industrial Internet of Things (IIoT) is present in many participants from the energy, health, manufa...
While introducing unprecedented applications, Internet of Things (IoT) has simultaneously provoked a...
Part 8: Risk Analysis and Security MetricsInternational audienceAssessing the vulnerability of large...
The Common Vulnerability Scoring System is used for the evaluation of vulnerabilities. There is a st...
The development of cyber‐assured systems is a challenging task, particularly due to the cost and com...
With the inclusion of external software components in their software, vendors also need to identify ...
Internet of Things (IoT) has been deployed in a vast number of smart applications with the aim to br...
The Consumer Internet of Things (CIoT) is a term to describe everyday items connected to the intern...
Advances in Information Security book series (ADIS, volume 70): Cyber Threat IntelligenceVarious res...
With the increasing number and severity of security incidents and exploits, information technology (...
With the inclusion of external software components in their software, vendors also need to identify ...
Internet and network security forms an interesting and topical, yet challenging and developing resea...
Assessing vulnerabilities supports analytics-based decision-making processes to protect Critical Inf...