{"title":"到包含移动设备操作系统漏洞描述的公开可用的国家数据库的问题","authors":"Stoyan Mechev","doi":"10.53656/math2023-1-7-tot","DOIUrl":null,"url":null,"abstract":"The paper aims to examine publicly available vulnerability databases and their systems for assessing the severity of damage that can be caused by malware targeting mobile devices running Android or iOS. The second goal of the study is to evaluate the vulnerability detection capabilities associated with a specific version of a mobile operating system. Methods used: comparative analysis and summary. Based on the results of the application of the comparative analysis, it is established which of the national databases have better capabilities to filter the data and obtain adequate results when searching for vulnerabilities for mobile devices.","PeriodicalId":41818,"journal":{"name":"Mathematics and Informatics","volume":null,"pages":null},"PeriodicalIF":0.2000,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"TO THE ISSUE OF PUBLICLY AVAILABLE NATIONAL DATABASES CONTAINING DESCRIPTIONS OF VULNERABILITIES FOR MOBILE DEVICE OPERATING SYSTEMS\",\"authors\":\"Stoyan Mechev\",\"doi\":\"10.53656/math2023-1-7-tot\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The paper aims to examine publicly available vulnerability databases and their systems for assessing the severity of damage that can be caused by malware targeting mobile devices running Android or iOS. The second goal of the study is to evaluate the vulnerability detection capabilities associated with a specific version of a mobile operating system. Methods used: comparative analysis and summary. Based on the results of the application of the comparative analysis, it is established which of the national databases have better capabilities to filter the data and obtain adequate results when searching for vulnerabilities for mobile devices.\",\"PeriodicalId\":41818,\"journal\":{\"name\":\"Mathematics and Informatics\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.2000,\"publicationDate\":\"2023-02-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Mathematics and Informatics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.53656/math2023-1-7-tot\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"EDUCATION & EDUCATIONAL RESEARCH\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Mathematics and Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.53656/math2023-1-7-tot","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"EDUCATION & EDUCATIONAL RESEARCH","Score":null,"Total":0}
TO THE ISSUE OF PUBLICLY AVAILABLE NATIONAL DATABASES CONTAINING DESCRIPTIONS OF VULNERABILITIES FOR MOBILE DEVICE OPERATING SYSTEMS
The paper aims to examine publicly available vulnerability databases and their systems for assessing the severity of damage that can be caused by malware targeting mobile devices running Android or iOS. The second goal of the study is to evaluate the vulnerability detection capabilities associated with a specific version of a mobile operating system. Methods used: comparative analysis and summary. Based on the results of the application of the comparative analysis, it is established which of the national databases have better capabilities to filter the data and obtain adequate results when searching for vulnerabilities for mobile devices.