A hierarchical evaluation approach for network security based on threat spread model

被引:0
|
作者
Chen, Feng [1 ,2 ]
Liu, Dehui [2 ]
Zhang, Yi [2 ]
Su, Jishu [2 ]
机构
[1] Network Information Center, Second Military Medical University, Shanghai 200433, China
[2] College of Computer, National University of Defense Technology, Changsha 410073, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:945 / 954
相关论文
共 50 条
  • [1] Quantitative hierarchical threat evaluation model for network security
    State Key Laboratory of Manufacturing System, Center for Networked Systems and Information Security, Xi'an Jiaotong University, Xi'an 710049, China
    不详
    Ruan Jian Xue Bao, 2006, 4 (885-897):
  • [2] Network Security Threat Situation Evaluation Based on Fusion Decision and Spread Analysis
    Cai, Xiangdong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 383 - 388
  • [3] Network Security Situation Awareness Based on Intercepting the Threat Spread
    Zhou, Bo
    Zhong, Lin-fei
    2013 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2013, : 876 - 879
  • [4] A threat model-based approach to security testing
    Marback, Aaron
    Do, Hyunsook
    He, Ke
    Kondamarri, Samuel
    Xu, Dianxiang
    SOFTWARE-PRACTICE & EXPERIENCE, 2013, 43 (02): : 241 - 258
  • [5] Approach of goal-oriented attack graph-based threat evaluation for network security
    Liu, Wei-Xin
    Zheng, Kang-Feng
    Hu, Ying
    Wu, Bin
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2015, 38 (01): : 82 - 86
  • [6] Network security situational awareness model based on threat intelligence
    Zhang H.
    Yin Y.
    Zhao D.
    Liu B.
    1600, Editorial Board of Journal on Communications (42): : 182 - 194
  • [7] Study on threat evaluation method for network security
    Man, Dapeng
    Yang, Wu
    Yang, Yongtian
    Zhou, Yuan
    Shenyang Jianzhu Daxue Xuebao (Ziran Kexue Ban)/Journal of Shenyang Jianzhu University (Natural Science), 2008, 24 (04): : 708 - 711
  • [8] Computer network security evaluation model based on neural network
    Li, Xinwei
    Chen, Hui
    Ariann, Bryan
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (01) : 71 - 78
  • [9] Threat Vector-Hierarchical Attack Representation Model-Based Threat Modeling and Security Assessment for Satellite Networks
    Park, Junbeom
    Eom, Taehoon
    Kim, Hyungeun
    Park, Hyeonsu
    Yoon, Zizung
    Park, Jongsou
    APPLIED SCIENCES-BASEL, 2025, 15 (05):
  • [10] An Information Security Threat Assessment Model based on Bayesian Network and OWA Operator
    Wu, Kehe
    Ye, Shichao
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (02): : 833 - 838