NIST logo

Publications Portal

You searched on:
Author: Peter Mell

Displaying records 1 to 10 of 31 records.
Resort by: Date / Title


1. Limitations to Threshold Random Walk Scan Detection and Mitigating Enhancements
Published: 10/16/2013
Authors: Peter M Mell, Richard Harang
Abstract: This paper discusses limitations in one of the most widely cited single source scan detection algorithms: threshold random walk (TRW). If an attacker knows that TRW is being employed, these limitations enable full circumvention allowing undetectable ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913287

2. What's Special About Cloud Security?
Published: 7/16/2012
Author: Peter M Mell
Abstract: While cloud security concerns have consistently ranked as one of the top challenges to cloud adoption, it is not clear what security issues are special with respect to cloud computing. To approach this question, we attempt to derive cloud security is ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910569

3. The Common Misuse Scoring System (CMSS): Metrics for Software Feature Misuse Vulnerabilities
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7864
Published: 7/10/2012
Authors: Elizabeth LeMay, Karen Ann Scarfone, Peter M Mell
Abstract: The Common Misuse Scoring System (CMSS) is a set of measures of the severity of software feature misuse vulnerabilities. A software feature is a functional capability provided by software. A software feature misuse vulnerability is a vulnerability in ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910230

4. The NIST Definition of Cloud Computing
Series: Special Publication (NIST SP)
Report Number: 800-145
Published: 9/28/2011
Authors: Timothy Grance, Peter M Mell
Abstract: Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909616

5. The Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7502
Published: 12/27/2010
Authors: Peter M Mell, Karen Scarfone
Abstract: The Common Configuration Scoring System (CCSS) is a set of measures of the severity of software security configuration issues. CCSS is derived from the Common Vulnerability Scoring System (CVSS), which was developed to measure the severity of vulnera ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906165

6. Intrusion Detection and Prevention Systems
Published: 10/22/2010
Authors: Karen Ann Scarfone, Peter M Mell
Abstract: Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents. An intrusion detection and prevention system (IDPS) is software that automates the intrusion de ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901146

7. State of Security Readiness
Published: 6/10/2010
Authors: Ramaswamy Chandramouli, Peter M Mell
Abstract: Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. However, th ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905281

8. An Analysis of CVSS Version 2 Vulnerability Scoring
Published: 10/14/2009
Authors: Karen Ann Scarfone, Peter M Mell
Abstract: The Common Vulnerability Scoring System (CVSS) is a specification that is used to measure the relative severity of software vulnerabilities. CVSS version 2, which was finalized in June 2007, was designed to address several deficiencies discovered dur ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903020

9. Vulnerability Scoring for Security Configuration Settings
Published: 10/29/2008
Authors: Karen Ann Scarfone, Peter M Mell
Abstract: The best-known vulnerability scoring standard, the Common Vulnerability Scoring System (CVSS), is designed to quantify the severity of security-related software flaw vulnerabilities. This paper describes our efforts to determine if CVSS could be adap ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152154

10. Improving the Common Vulnerability Scoring System
Published: 9/28/2007
Authors: Peter M Mell, Karen Ann Scarfone
Abstract: The Common Vulnerability Scoring System is an emerging standard for scoring the impact of vulnerabilities. This paper presents the results of our analysis of the scoring system and the results of our experiment scoring a large set of vulnerabilities ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51124



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series