Peter Mell

ORCID: 0000-0003-2938-897X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Information and Cyber Security
  • Advanced Malware Detection Techniques
  • Blockchain Technology Applications and Security
  • Software Reliability and Analysis Research
  • Internet Traffic Analysis and Secure E-voting
  • Software Engineering Research
  • Cryptography and Data Security
  • Web Application Security Vulnerabilities
  • Access Control and Trust
  • Complex Network Analysis Techniques
  • Software System Performance and Reliability
  • Cloud Data Security Solutions
  • Criminal Justice and Corrections Analysis
  • Spam and Phishing Detection
  • Mobile Ad Hoc Networks
  • Security and Verification in Computing
  • IPv6, Mobility, Handover, Networks, Security
  • Distributed systems and fault tolerance
  • Mobile Agent-Based Network Management
  • Network Packet Processing and Optimization
  • IoT and Edge/Fog Computing
  • Radiation Effects in Electronics
  • Big Data and Business Intelligence
  • Semantic Web and Ontologies

National Institute of Standards
2005-2025

National Institute of Standards and Technology
2016-2025

Information Technology Laboratory
2001-2023

IEEE Computer Society
2021

Institute of Electrical and Electronics Engineers
2021

Regional Municipality of Niagara
2021

MIT Lincoln Laboratory
2003

Massachusetts Institute of Technology
2003

United States Department of Commerce
2001

The Information Technology Laboratory (ITL) at the National Institute of Standards and (NIST) promotes U.S. economy public welfare by providing technical leadership for Nation's measurement standards infrastructure.ITL develops tests, test methods, reference data, proof concept implementations, analyses to advance development productive use information technology.ITL's responsibilities include management, administrative, technical, physical

10.6028/nist.ir.8202 preprint EN 2018-10-01

Historically, vendors have used their own methods for scoring software vulnerabilities, usually without detailing criteria or processes. This creates a major problem users, particularly those who manage disparate IT systems and applications. The Common Vulnerability Scoring System (CVSS) is public initiative designed to address this issue by presenting framework assessing quantifying the impact of vulnerabilities. Organizations currently generating CVSS scores include Cisco, US National...

10.1109/msp.2006.145 article EN IEEE Security & Privacy 2006-11-01

The Common Vulnerability Scoring System (CVSS) is a specification for measuring the relative severity of software vulnerabilities. Finalized in 2007, CVSS version 2 was designed to address deficiencies found during analysis and use original version. This paper analyzes how effectively addresses these what new it may have. based primarily on an experiment that applied both 1 scoring large set recent Theoretical characteristics scores were also examined. results show goals changes met, but...

10.1109/esem.2009.5314220 article EN 2009-10-01

The Common Vulnerability Scoring System is an emerging standard for scoring the impact of vulnerabilities. results analysis system and that experiment a large set vulnerabilities using are presented. Although was found to be useful, it contains variety deficiencies limit its ability measure study demonstrates how these could addressed in subsequent versions changes backwards-compatible with existing efforts. In conclusion recommendation revised experiments demonstrate revision would address...

10.1049/iet-ifs:20060055 article EN IET Information Security 2007-09-10

Although cloud security concerns have consistently ranked as one of the top challenges to adoption, it's not clear what issues are particular computing. To approach this question, author attempts derive from various definitions and a reference architecture.

10.1109/mitp.2012.84 article EN IT Professional 2012-07-01
Coming Soon ...