A hierarchical evaluation approach for network security based on threat spread model

被引:0
|
作者
Chen, Feng [1 ,2 ]
Liu, Dehui [2 ]
Zhang, Yi [2 ]
Su, Jishu [2 ]
机构
[1] Network Information Center, Second Military Medical University, Shanghai 200433, China
[2] College of Computer, National University of Defense Technology, Changsha 410073, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:945 / 954
相关论文
共 50 条
  • [41] A Quantitative Risk Evaluation Model for Network Security Based on Body Temperature
    Jiang, Y. P.
    Cao, C. C.
    Mei, X.
    Guo, H.
    JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2016, 2016
  • [42] Computer system security threat evaluation based upon artificial immunity model and fuzzy logic
    Graham, JH
    Yu, YB
    INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOL 1-4, PROCEEDINGS, 2005, : 1297 - 1302
  • [43] IoT Security in Industry: A Threat Model of Existing and Future Network Infrastructure
    McNett, Jackie
    McNett, Josh
    Su, Xiaoli
    JOURNAL OF APPLIED SECURITY RESEARCH, 2024, 19 (01) : 1 - 19
  • [44] A Hierarchical Architectural Model for Network Security Exploring Situational Awareness
    Almeida, Ricardo Borges
    Covalski, Victor
    Machado, Roger
    Leal da Rosa, Diorgenes Yuri
    Yamin, Adenauer Correa
    Donato, Lucas Medeiros
    Pernas, Ana Marilza
    SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 1365 - 1372
  • [45] A Hierarchical Security Event Correlation Model for Real-Time Threat Detection and Response
    Maosa, Herbert
    Ouazzane, Karim
    Ghanem, Mohamed Chahine
    NETWORK, 2024, 4 (01): : 68 - 90
  • [46] Ontology Based Approach for Network Security
    Arunadevi, M.
    Perumal, K. S.
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2016, : 573 - 578
  • [47] The Study on Network Security Strategy based on Security Evaluation
    Bi, Yan
    COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION III, 2014, 443 : 446 - 450
  • [48] Network Security in the Context of the Botnets Threat
    Constantinescu, Radu
    Zota, Razvan Daniel
    Vasilescu, Adrian
    6TH ROEDUNET INTERNATIONAL CONFERENCE, PROCEEDINGS, 2007, : 80 - 82
  • [49] Probabilistic Threat Propagation for Network Security
    Carter, Kevin M.
    Idika, Nwokedi
    Streilein, William W.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (09) : 1394 - 1405
  • [50] A Threat Model-Driven Security Testing Approach for Web Application
    Yan, Bobo
    Li, Xiaohong
    Du, Zhijie
    CONTEMPORARY RESEARCH ON E-BUSINESS TECHNOLOGY AND STRATEGY, 2012, 332 : 158 - 168