Network security risk assessment based on item response theory
Abstract
References
Index Terms
- Network security risk assessment based on item response theory
Recommendations
Research on Real-Time Network Security Risk Assessment and Forecast
ICICTA '10: Proceedings of the 2010 International Conference on Intelligent Computation Technology and Automation - Volume 03Modern security problems focus on sensibly allocating resources to decrease the magnitude of potential hazards, decrease the chances of adversary success given an attempt, or minimize loss following a successful attack. However, current risk assessment ...
Network Security Risk Assessment Based on Service Dependency Analysis
ICICSE '10: Proceedings of the 2010 Fifth International Conference on Internet Computing for Science and EngineeringUtilizing computer aided security risk assessment, administrators can apperceive network security situation quickly and take countermeasures effectively. Most assessment methods disregard the dependencies among services, lack the evaluation against ...
Detection, Mitigation and Quantitative Security Risk Assessment of Invisible Attacks at Enterprise Network
FICLOUD '15: Proceedings of the 2015 3rd International Conference on Future Internet of Things and CloudGiven the increasing dependence of our societies on network information systems and the efforts being provided by security communities to secure their networks, a strong sense of insecurity still prevails. Therefore, there is a need for new ...
Comments
Information & Contributors
Information
Published In
Publisher
ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
Brussels, Belgium
Publication History
Author Tags
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 32Total Downloads
- Downloads (Last 12 months)17
- Downloads (Last 6 weeks)7
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in