Articolul precedent |
Articolul urmator |
![]() |
![]() ![]() |
Căutarea după subiecte similare conform CZU |
004.056 (232) |
Информационные технологии. Вычислительная техника. Обработка данных (4280) |
![]() BORTĂ, Grigorii. Vulnerability researchers role in malware lifecycle. In: Application of information and communication technology in economy and education, Ed. Ediția 1-a, 2-3 decembrie 2011, Sofia. Sofia: 2011, Ediția 1-a, pp. 656-660. ISBN 978-954-92247-3-3. |
EXPORT metadate: Google Scholar Crossref CERIF DataCite Dublin Core |
Application of information and communication technology in economy and education Ediția 1-a, 2011 |
||||||
Conferința "Application of information and communication technology in economy and education" Ediția 1-a, Sofia, Bulgaria, 2-3 decembrie 2011 | ||||||
|
||||||
CZU: 004.056 | ||||||
Pag. 656-660 | ||||||
|
||||||
![]() |
||||||
Rezumat | ||||||
Vulnerability is a weakness which allows a malefactor to perform harmful actions on a target computer system. But exploiting vulnerability is just a single step in a long chain of events that make up the lifecycle of malware. The chain starts with research which aims to finding breaches in computer security systems. This paper aims to demonstrate the role of the software vulnerability researchers in malware lifecycle. |
||||||
Cuvinte-cheie vulnerability, research, information security, shadow economics |
||||||
|
Cerif XML Export
<?xml version='1.0' encoding='utf-8'?> <CERIF xmlns='urn:xmlns:org:eurocris:cerif-1.5-1' xsi:schemaLocation='urn:xmlns:org:eurocris:cerif-1.5-1 http://www.eurocris.org/Uploads/Web%20pages/CERIF-1.5/CERIF_1.5_1.xsd' xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' release='1.5' date='2012-10-07' sourceDatabase='Output Profile'> <cfResPubl> <cfResPublId>ibn-ResPubl-198821</cfResPublId> <cfResPublDate>2011</cfResPublDate> <cfVol>Ediția 1-a</cfVol> <cfStartPage>656</cfStartPage> <cfISBN>978-954-92247-3-3</cfISBN> <cfURI>https://ibn.idsi.md/ro/vizualizare_articol/198821</cfURI> <cfTitle cfLangCode='EN' cfTrans='o'>Vulnerability researchers role in malware lifecycle</cfTitle> <cfKeyw cfLangCode='EN' cfTrans='o'>vulnerability; research; information security; shadow economics</cfKeyw> <cfAbstr cfLangCode='EN' cfTrans='o'><p>Vulnerability is a weakness which allows a malefactor to perform harmful actions on a target computer system. But exploiting vulnerability is just a single step in a long chain of events that make up the lifecycle of malware. The chain starts with research which aims to finding breaches in computer security systems. This paper aims to demonstrate the role of the software vulnerability researchers in malware lifecycle.</p></cfAbstr> <cfResPubl_Class> <cfClassId>eda2d9e9-34c5-11e1-b86c-0800200c9a66</cfClassId> <cfClassSchemeId>759af938-34ae-11e1-b86c-0800200c9a66</cfClassSchemeId> <cfStartDate>2011T24:00:00</cfStartDate> </cfResPubl_Class> <cfResPubl_Class> <cfClassId>e601872f-4b7e-4d88-929f-7df027b226c9</cfClassId> <cfClassSchemeId>40e90e2f-446d-460a-98e5-5dce57550c48</cfClassSchemeId> <cfStartDate>2011T24:00:00</cfStartDate> </cfResPubl_Class> <cfPers_ResPubl> <cfPersId>ibn-person-44042</cfPersId> <cfClassId>49815870-1cfe-11e1-8bc2-0800200c9a66</cfClassId> <cfClassSchemeId>b7135ad0-1d00-11e1-8bc2-0800200c9a66</cfClassSchemeId> <cfStartDate>2011T24:00:00</cfStartDate> </cfPers_ResPubl> </cfResPubl> <cfPers> <cfPersId>ibn-Pers-44042</cfPersId> <cfPersName_Pers> <cfPersNameId>ibn-PersName-44042-3</cfPersNameId> <cfClassId>55f90543-d631-42eb-8d47-d8d9266cbb26</cfClassId> <cfClassSchemeId>7375609d-cfa6-45ce-a803-75de69abe21f</cfClassSchemeId> <cfStartDate>2011T24:00:00</cfStartDate> <cfFamilyNames>Бортэ</cfFamilyNames> <cfFirstNames>Григорий</cfFirstNames> </cfPersName_Pers> </cfPers> </CERIF>