A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2013; you can also visit the original URL.
The file type is application/pdf
.
Agent-based host enumeration and vulnerability scanning using dynamic topology information
2010
2010 Information Security for South Africa
Edge networks in enterprise networks are increasingly complex and dynamic, raising questions about the ability to maintain a current overview of computing assets on the network and their potential vulnerability. However, to respond to ongoing or impending attacks that may propagate at high speed, it has become crucial to ensure proper and efcient reachability of all network nodes that might be at risk so as to be able to assess and, where possible, mitigate the threat. In this paper we
doi:10.1109/issa.2010.5588317
fatcat:4tktlam3x5hrjkczntpzic6dmm