DOVES
Database Of Vulnerabilities, Exploits, and Signatures
Vulnerabilities for hypothesis testing
Attacks for analyzing, verifying vulnerabilities
Signatures for intrusion detection systems
Previous slide
Next slide
Back to first slide
View graphic version