A hierarchical evaluation approach for network security based on threat spread model

被引:0
|
作者
Chen, Feng [1 ,2 ]
Liu, Dehui [2 ]
Zhang, Yi [2 ]
Su, Jishu [2 ]
机构
[1] Network Information Center, Second Military Medical University, Shanghai 200433, China
[2] College of Computer, National University of Defense Technology, Changsha 410073, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:945 / 954
相关论文
共 50 条
  • [21] An Evaluation Model for Network Security Based on an Optimized Circular Algorithm
    Li X.
    Journal of Cyber Security and Mobility, 2023, 12 (05): : 711 - 732
  • [22] Cyber Security, a Threat to Cyber Banking in South Africa An approach to Network and application security
    Mbelli, Thierry Mbah
    Dwolatzky, Barry
    2016 IEEE 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2016, : 1 - 6
  • [23] Cybercrime: A threat to Network Security
    Yassir, Ammar
    Nayak, Smitha
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (02): : 84 - 88
  • [24] A Formal Approach for the Evaluation of Network Security Mechanisms Based on RBAC Policies
    Laborde, R.
    Nasser, B.
    Grasset, F.
    Barrere, F.
    Benzekri, A.
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 121 : 117 - 142
  • [25] A quantitative evaluation model for network security
    Man, Dapeng
    Yang, Wu
    Yang, Yongtian
    Wang, Wei
    Zhang, Lejun
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 773 - 777
  • [26] Hierarchical protection mechanism of network information based on computer security model algorithm terminal
    Peng, Yue
    Limin, Zhao
    Acta Technica CSAV (Ceskoslovensk Akademie Ved), 2017, 62 (02): : 341 - 350
  • [27] Study on the Evaluation Model for Network Security
    Li, Jian Hong
    Li, Guang Zhen
    EQUIPMENT MANUFACTURING TECHNOLOGY AND AUTOMATION, PTS 1-3, 2011, 317-319 : 1745 - 1748
  • [28] A New Ecology Model for Internet Worm Security Threat Evaluation
    Wang XiaoPeng
    Wang Bailing
    Liu Yang
    He Hui
    Sun Yunxiao
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2013, 6 (02): : 107 - 115
  • [29] A new ecology model for internet worm security threat evaluation
    1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Prof B.H.Kang's Office,, Australia (06):
  • [30] Security Model Based on Network Business Security
    Wu Kehe
    Zhang Tong
    Li Wei
    Ma Gang
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT, VOL 1, 2009, : 577 - 580