The paper is aimed at researching the dynamic of objects publications in question of threats activity. Analysis of the author activities is lied in public and private sources like the Internet or the shadow global networks like TOR, VPN, Socks, Proxy and Mesh. In paper for analyzing the 10 most popular software are used for Windows operation system. The special program complex called Scan Project is applied for accumulating the messages about vulnerabilities and software mistakes. The 10 most active authors are shown.This research was made by the grant through R&D “Academy Infotecs”
This paper analyses security problems of modern computer systems caused by vulnerabilities in their ...
The paper contains information about hacking types and systems which they are suffered the most cybe...
The typical cyber attacker is assumed to be all powerful and to exploit allpossible vulnerabilities....
Most computerized information systems we use in our everyday lives provide very little protection ag...
A computer system's security can be compromised in many ways—a denial-of-service attack can make a s...
The use of the Internet has increased drastically the last few years. This trend has led to a consta...
When critical assets or functionalities are included in a piece of software accessible to the end us...
Objective. Demonstrates the results of research that aimed to analyze the computational vulnerabilit...
Vulnerabilities are rapidly increasing everyday, posing a major threat to security products. It is d...
There is little or no information available on what actually happens when a software vulnerability i...
The increase in both the use of open-source software (OSS) and the number of new vulnerabilities rep...
Software vulnerabilities play a major role, as there are multiple risks associated, including loss a...
Some of the key aspects of vulnerability—discovery, dissemination, and disclosure—have received some...
This paper of work examines the SolarWinds attack, designed on Orion Platform security incident. It ...
This study examined media coverage of computer security threats by print sources using diffusion of ...
This paper analyses security problems of modern computer systems caused by vulnerabilities in their ...
The paper contains information about hacking types and systems which they are suffered the most cybe...
The typical cyber attacker is assumed to be all powerful and to exploit allpossible vulnerabilities....
Most computerized information systems we use in our everyday lives provide very little protection ag...
A computer system's security can be compromised in many ways—a denial-of-service attack can make a s...
The use of the Internet has increased drastically the last few years. This trend has led to a consta...
When critical assets or functionalities are included in a piece of software accessible to the end us...
Objective. Demonstrates the results of research that aimed to analyze the computational vulnerabilit...
Vulnerabilities are rapidly increasing everyday, posing a major threat to security products. It is d...
There is little or no information available on what actually happens when a software vulnerability i...
The increase in both the use of open-source software (OSS) and the number of new vulnerabilities rep...
Software vulnerabilities play a major role, as there are multiple risks associated, including loss a...
Some of the key aspects of vulnerability—discovery, dissemination, and disclosure—have received some...
This paper of work examines the SolarWinds attack, designed on Orion Platform security incident. It ...
This study examined media coverage of computer security threats by print sources using diffusion of ...
This paper analyses security problems of modern computer systems caused by vulnerabilities in their ...
The paper contains information about hacking types and systems which they are suffered the most cybe...
The typical cyber attacker is assumed to be all powerful and to exploit allpossible vulnerabilities....