Open Access

Assessing the effect size of users’ consciousness for computer networks vulnerability


Cite

[1] Bognár L, Joós A, Nagy B, An Improvement for a Mathematical Model for Distributed Vulnerability Assessment, Acta Universitatis Sapientiae, Mathematica, 10 (2) (2018), 203–217.10.2478/ausm-2018-0017Search in Google Scholar

[2] Hadarics K, Györffy K, Nagy B, Bognár L, Arrott A and Leitold F, Mathematical Model of Distributed Vulnerability Assessment, In: Jaroslav Dočkal, Milan Jirsa, Josef Kaderka, Proceedings of Conference SPI 2017: Security and Protection of Information Brno, 2017.07.01-2017.07.02. Brno: University of Defence, 2017. pp. 45–57 (ISBN:978-80-7231-414-0).Search in Google Scholar

[3] Leitold F, Arrott A and Hadarics K, Quantifying cyber-threat vulnerability by combining threat intelligence, IT infrastructure weakness, and user susceptibility 24th Annual EICAR Conference, Nuremberg, Germany, 2016.Search in Google Scholar

[4] Leitold F, Hadarics K, Measuring security risk in the cloud-enabled enterprise In: Dr Fernando C Colon Osorio, 7th International Conference on Malicious and Unwanted Software (MALWARE), Fajardo, Puerto Rico, 2012.10.16-2012.10.18. Piscataway (NJ): IEEE, 2012. pp. 62–66 (ISBN:978-1-4673-4880-5).Search in Google Scholar

eISSN:
2066-7752
Language:
English
Publication timeframe:
2 times per year
Journal Subjects:
Mathematics, General Mathematics