A hierarchical evaluation approach for network security based on threat spread model

被引:0
|
作者
Chen, Feng [1 ,2 ]
Liu, Dehui [2 ]
Zhang, Yi [2 ]
Su, Jishu [2 ]
机构
[1] Network Information Center, Second Military Medical University, Shanghai 200433, China
[2] College of Computer, National University of Defense Technology, Changsha 410073, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:945 / 954
相关论文
共 50 条
  • [31] Threat Model Based Security for Wireless Mesh Networks
    Popalyar, Freshta
    MOBILE COMPUTING, APPLICATIONS, AND SERVICES (MOBICASE 2015), 2015, 162 : 325 - 332
  • [32] Network Security Situation Awareness Framework based on Threat Intelligence
    Zhang, Hongbin
    Yi, Yuzi
    Wang, Junshe
    Cao, Ning
    Duan, Qiang
    CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 56 (03): : 381 - 399
  • [33] Threat analysis for space information network based on network security attributes: a review
    Wu, Xuesong
    Du, Ye
    Fan, Tao
    Guo, Junyan
    Ren, Jie
    Wu, Runfang
    Zheng, Tianshuai
    COMPLEX & INTELLIGENT SYSTEMS, 2023, 9 (03) : 3429 - 3468
  • [34] Threat analysis for space information network based on network security attributes: a review
    Xuesong Wu
    Ye Du
    Tao Fan
    Junyan Guo
    Jie Ren
    Runfang Wu
    Tianshuai Zheng
    Complex & Intelligent Systems, 2023, 9 : 3429 - 3468
  • [35] A model-based approach to the security testing of network protocol implementations
    Allen, William H.
    Dou, Chin
    Marin, Gerald A.
    31ST IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2006, : 1008 - +
  • [36] Evaluation for Network Security Based on the Read-Write Transition Model
    Lu, Zhiyong
    Tang, Chaojing
    2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 5, 2010, : 420 - 424
  • [37] Risk Evaluation for Security Network Based on Protection Model and Risk Entropy
    Lv, Haitao
    Hu, Ruimin
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON TEACHING AND COMPUTATIONAL SCIENCE, 2014, : 146 - 149
  • [38] Research on comprehensive evaluation model of network security based on information entropy
    Zhang, Yi
    2021 6TH INTERNATIONAL CONFERENCE ON SMART GRID AND ELECTRICAL AUTOMATION (ICSGEA 2021), 2021, : 401 - 404
  • [39] Wireless Sensor Network Technology Based on Security Trust Evaluation Model
    Zhu, Jinghua
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (04) : 211 - 226
  • [40] Artificial immune danger theory based model for network security evaluation
    Sun F.
    Journal of Networks, 2011, 6 (02) : 255 - 262