SciELO - Scientific Electronic Library Online

SciELO - Scientific Electronic Library Online

Referencias del artículo

FRANCO, David A; PEREA, Jorge L  y  PUELLO, Plinio. Metodología para la Detección de Vulnerabilidades en Redes de Datos. Inf. tecnol. [online]. 2012, vol.23, n.3, pp.113-120. ISSN 0718-0764.

    Al-Fedaghi Sabah, System-based Approach to Software Vulnerability, socialcom: IEEE Second International Conference on Social Computing 2010, 1072-1079, (2010). [ Links ]

    Bau J., Bursztein E., Gupta D., Mitchell J., State of the Art: Automated Black-Box Web Application Vulnerability Testing, 2010 IEEE Symposium on Security and Privacy, 332-345, (2010). [ Links ]

    GARCIA, V.E. y VAZQUEZ, R., Arquitectura de un Billete Electrónico Anónimo: Medios Electrónicos de Pagos, Inf. tecnol, ISSN 0718-0764 (en línea), 16(3), 71-80 (2005), Acceso: 22 de Noviembre (2011). [ Links ]

    Hadavi V.A., Sangchi H. V., Hamishagi V. S. y Shirazi H. Software Security; A Vulnerability-Activity Revisit, 2008 Third International Conference on Availability, Reliability and Security, 866-872, Marzo (2008). [ Links ]

    Harada Toshiki, Kanaoka Akira, Okamoto Eiji y Kato Masahiko, Identifying Potentially-Impacted Area by Vulnerabilities in Networked Systems Using CVSS,2010 10th IEEE/IPSJ International Symposium on Applications and the Internet, 367-370, (2010). [ Links ]

    Huang Shuguang, Tang Heping, Zhang Min y Tian Jie, Text Clustering on National Vulnerability Database, 2010 Second International Conference on Computer Engineering and Applications, 295-299, (2010). [ Links ]

    Jensen V., Gruschka N. y Luttenberger N., The impact of flooding attacks on network-based services, in Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, IEEE Computer Society,509-513, Barcelona, España, Marzo (2008). [ Links ]

    Kuhn Rick y Johnson Chris, Vulnerability Trends: Measuring Progress, IT Professional, 51-53, Julio (2010). [ Links ]

    Mell P, Scarfone K. y Romanosky S, A Complete Guide to the Common Vulnerability Scoring System Version 2.0, Junio (2007). [ Links ]

    National Institut of Standards and Tecnology., National Vulnerability Database (2011), Acceso: 22 de Noviembre (2011). [ Links ]

    Pfleeger S., Ciszek T., Choosing a Security Option: The InfoSecure Methodology, IT Professional, volumen 10, numero 5, 46-52, (2008). [ Links ]

    QUALYS, The Top Cyber Security Risks Two risks dwarf all others, but organizations fail to mitigate them, Septiembre (2009). [ Links ]

    Romero B., Haddad H. y Molero J., A Methodological Tool for Asset Identification in Web Applications: Security Risk Assessment, 2009 Fourth International Conference on Software Engineering Advances, 413-418, (2009). [ Links ]

    Ruiz J., Ponce I., Díaz O., Zavala J., Zarate J. y Fuentes A., MISMA: An Approach to Mexican Information Security Methodology and Architecture for PYMES, conielecomp, 2009 International Conference on Electrical, Communications, and Computers, 65-68, (2009). [ Links ]

    Shi H., Chen B. y Yu L., Analysis of Web Security Comprehensive Evaluation Tools, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, 285-289, (2010). [ Links ]

    Watanabe Takanobu, Cheng Zixue, Kansen Mizuo y Hisada Masayuki, A New Security Testing Method for Detecting Flash Vulnerabilities by Generating Test Patterns, 2010 13th International Conference on Network-Based Information Systems, 469-474, (2010). [ Links ]

    Wren Chris, Reilly Denis y Berry Tom, Footprinting: A Methodology for Auditing eSystem Vulnerabilities, 2010 Developments in E-systems Engineering, 263-267, (2010). [ Links ]

    Xinlan Zhang, Zhifang Huang, Guangfu Wei y Zhang Xin, Information Security Risk Assessment Methodology Research: Group Decision Making and Analytic Hierarchy Process, 2010 Second WRI World Congress on Software Engineering, wcse, volumen 2, 157-160, (2010). [ Links ]

    Yun-hua Gu y Pei Li, Design and Research on Vulnerability Database, 2010 Third International Conference on Information and Computing, 209-212, (2010). [ Links ]