A Design of Automated Vulnerability Information Management System for Secure Use of Internet-Connected Devices Based on Internet-Wide Scanning Methods Taeeun KIMHwankuk KIM
Publication: IEICE TRANSACTIONS on Information and Systems Publication Date: 2008/05/01 Vol. E91-DNo. 5 ;
pp. 1242-1251 Type of Manuscript: INVITED PAPER (Special Section on Information and Communication System Security) Category: Keyword: trusted computing, integrity management, vulnerability management,