Novel Compositing Method for Quantification of Wireless Network Security

被引:0
|
作者
Jung, Sungmo [1 ]
Kim, Jong Hyun [2 ]
Kim, Seoksoo [1 ]
机构
[1] Hannam Univ, Dept Multimedia, Daejoen 306791, South Korea
[2] Elect & Telecommun Res Inst, Daejeon 305700, South Korea
关键词
Security; Quantification; Wireless; Network; Threat;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network security quantification techniques are required by many organizations because they are very effective at highlighting malicious threats. In most cases, however, research in this area has not been accessible by administrators and clients thus far. For this reason, the accessibility of security reports should be considered with the intention of making such reports concise and readable. This paper suggests a novel compositing method for the quantification of wireless network security as an approach to simplifying security reports.
引用
收藏
页码:1 / +
页数:3
相关论文
共 50 条
  • [31] A data fusion method of wireless sensor network based on security protection
    Li, Li
    Mu, Kun
    Journal of Computational Information Systems, 2013, 9 (17): : 7029 - 7036
  • [32] A Novel Method of Topology Modeling in Heterogeneous Wireless Network
    Sun Yong
    Wen Xiangming
    Zhao Zhenmin
    Li Yuan
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [33] Novel TMA Method Using Wireless Sensor Network
    Cao Yichao
    Fang Jianan
    PROCEEDINGS OF THE 29TH CHINESE CONTROL CONFERENCE, 2010, : 4742 - 4747
  • [34] A NOVEL HYBRID LOCALIZATION METHOD FOR WIRELESS SENSOR NETWORK
    Jun, Wang
    Fu, Zhang
    Ren Tiansi
    Xun, Chen
    Gang, Liu
    INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2016, 9 (03): : 1323 - 1340
  • [35] A Novel Method for Minimum Comprehensive Cost Network Coding in Wireless Network
    Wu Yaohui
    Shao Pengfei
    PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON COMPUTERS & INFORMATICS, 2015, 13 : 2449 - 2456
  • [36] Wireless Sensor Network with a Novel Key Distribution for Improved Four-Tier Network Security
    Poonguzhali, S.
    RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES, 2015, 6 (04): : 319 - 327
  • [37] Hidden Markov Model Based Real Time Network Security Quantification Method
    Li, Weiming
    Guo, Zhengbiao
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 94 - 100
  • [38] A Quantification Method for Network Security Situational Awareness Based on Conditional Random Fields
    Li, Jianping
    Wang, Huiqiang
    ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 993 - 998
  • [39] iMeasure Security (iMS): A Novel Framework for Security Quantification
    Vijayaraghavan, V.
    Paul, Sanjoy
    2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & COMMUNICATIONS (NETCOM 2009), 2009, : 414 - 421
  • [40] Novel Approach for Security in Wireless Sensor Network using Bio-Inspirations
    Rathore, Heena
    Badarla, Venkataramana
    Jha, Sushmita
    Gupta, Anupam
    2014 SIXTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS), 2014,