Novel Compositing Method for Quantification of Wireless Network Security

被引:0
|
作者
Jung, Sungmo [1 ]
Kim, Jong Hyun [2 ]
Kim, Seoksoo [1 ]
机构
[1] Hannam Univ, Dept Multimedia, Daejoen 306791, South Korea
[2] Elect & Telecommun Res Inst, Daejeon 305700, South Korea
关键词
Security; Quantification; Wireless; Network; Threat;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network security quantification techniques are required by many organizations because they are very effective at highlighting malicious threats. In most cases, however, research in this area has not been accessible by administrators and clients thus far. For this reason, the accessibility of security reports should be considered with the intention of making such reports concise and readable. This paper suggests a novel compositing method for the quantification of wireless network security as an approach to simplifying security reports.
引用
收藏
页码:1 / +
页数:3
相关论文
共 50 条
  • [41] AlertChain IDN: A Novel Network Security Threat Perception Method
    Zhang, Fan
    Wang, Xie
    Ye, Zheng
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 124 : 180 - 180
  • [42] A novel stochastic modeling method for network security situational awareness
    Liang, Y.
    Wang, H. Q.
    Cai, H. B.
    He, Y. J.
    ICIEA 2008: 3RD IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, PROCEEDINGS, VOLS 1-3, 2008, : 2422 - +
  • [43] Low energy consumption security method for protecting information of wireless sensor network
    Hyun, J
    Kim, S
    ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS, 2006, 3842 : 397 - 404
  • [44] Energy efficient security method for wireless sensor network with hiding location information
    Hyun, Jaemyung
    Kim, Sungsoo
    PROCEEDINGS OF THE NINTH IASTED INTERNATIONAL CONFERENCE ON INTERNET AND MULTIMEDIA SYSTEMS AND APPLICATIONS, 2005, : 281 - 287
  • [45] On the security of wireless network protocol 802.11
    Sun, Hong
    Yang, Yi-Xian
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2003, 31 (07): : 1098 - 1100
  • [46] Wireless Network Security Vulnerabilities and Concerns
    Mushtaq, Ahmad
    SECURITY TECHNOLOGY, DISASTER RECOVERY AND BUSINESS CONTINUITY, 2010, 122 : 207 - 219
  • [47] Security and application of wireless sensor network
    Zhang Huanan
    Xing Suping
    Wang Jiannan
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY, 2021, 183 : 486 - 492
  • [48] Designing of Security Hardware for Wireless Network
    Ozalp, Murat
    Karakuzu, Cihan
    Zengin, Ahmet
    2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2018, : 244 - 247
  • [49] Research on Wireless Network Security Model
    Linmao
    Wangyong
    INTELLIGENCE COMPUTATION AND EVOLUTIONARY COMPUTATION, 2013, 180 : 785 - 790
  • [50] Security mechanisms for Wireless Home Network
    Zhuge, J
    Yao, R
    GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1527 - 1531