Autonomic networks and services are exposed to a large variety of security risks. The vulnerability management process plays a crucial role for ensuring their safe configurations and preventing security attacks. We focus in this survey on the assessment of vulnerabilities in autonomic environments. In particular, we analyze current methods and techniques contributing to the discovery, the description and the detection of these vulnerabilities. We also point out important challenges that should be faced in order to fully integrate this process into the autonomic management plane. © 2014 IEEE
This report presents the main results from the knowledge-building project Vulnerability and security...
In the last three years, the unprecedented increase in discovered vulnerabilities ranked with critic...
The importance of cyber protection is increasing, and as reported by the Global Risks Report 2020, c...
International audienceAutonomic networks and services are exposed to a large variety of security ris...
Over the last years, the massive deployment of computing devices over disparate interconnected infra...
Risk and Vulnerability Analysis (RVA) aims at identifying the weaknesses of the networks that may be...
Part 2: PhD Workshop: Autonomic Network and Service ManagementInternational audienceThe autonomic pa...
International audienceVulnerability management constitutes a crucial activity within autonomic netwo...
A suitable vulnerability assessment process improves the over-all security of an organization, and t...
The early version of the Internet was designed for connectivity only, without the consideration of s...
Starting from practical scenarios we underline that the most relevant security vulnerabilities in pr...
We witness an ongoing intensive research towards the specification and implementation of autonomic b...
In modern factories, personal computers are starting to replace traditional programmable logic contr...
Adaptivity requires at least frequent, and ideally real-time, updates and also requires the ability ...
The increasing complexity of information and telecommunications systems and networks is reaching a l...
This report presents the main results from the knowledge-building project Vulnerability and security...
In the last three years, the unprecedented increase in discovered vulnerabilities ranked with critic...
The importance of cyber protection is increasing, and as reported by the Global Risks Report 2020, c...
International audienceAutonomic networks and services are exposed to a large variety of security ris...
Over the last years, the massive deployment of computing devices over disparate interconnected infra...
Risk and Vulnerability Analysis (RVA) aims at identifying the weaknesses of the networks that may be...
Part 2: PhD Workshop: Autonomic Network and Service ManagementInternational audienceThe autonomic pa...
International audienceVulnerability management constitutes a crucial activity within autonomic netwo...
A suitable vulnerability assessment process improves the over-all security of an organization, and t...
The early version of the Internet was designed for connectivity only, without the consideration of s...
Starting from practical scenarios we underline that the most relevant security vulnerabilities in pr...
We witness an ongoing intensive research towards the specification and implementation of autonomic b...
In modern factories, personal computers are starting to replace traditional programmable logic contr...
Adaptivity requires at least frequent, and ideally real-time, updates and also requires the ability ...
The increasing complexity of information and telecommunications systems and networks is reaching a l...
This report presents the main results from the knowledge-building project Vulnerability and security...
In the last three years, the unprecedented increase in discovered vulnerabilities ranked with critic...
The importance of cyber protection is increasing, and as reported by the Global Risks Report 2020, c...