A framework for automated evaluation of security metrics

M Zaber, S Nair - Proceedings of the 15th International Conference on …, 2020 - dl.acm.org
Observation is the foundation of scientific experimentation. We consider observations to be
measurements when they are quantified with respect to an agreed upon scale, or …

Measuring network security using Bayesian network-based attack graphs

M Frigault - 2010 - spectrum.library.concordia.ca
Given the increasing dependence of our societies on networked information systems, the
overall security of such systems should be measured and improved. Recent research has …

On the analysis of QoE-based performance degradation in YouTube traffic

P Casas, A D'Alconzo, P Fiadino, A Bär… - … on Network and …, 2014 - ieeexplore.ieee.org
YouTube is the most popular service in today's Internet. Google relies on its massive
Content Delivery Network (CDN) to push YouTube videos as close as possible to the end …

[引用][C] 信息安全风险管理研究

王桢珍, 谢永强, 武晓悦, 葛方斌 - 信息安全与通信保密, 2007

[PDF][PDF] An empirical study of a vulnerability metric aggregation method

S Zhang, X Ou, A Singhal, J Homer - … SAM'11), special track on Mission …, 2011 - csrc.nist.gov
Quantifying security risk is an important and yet difficult task in enterprise network risk
management, critical for proactive mission assurance. Even though metrics exist for …

A vulnerability life cycle-based security modeling and evaluation approach

GV Marconato, M Kaâniche… - The Computer …, 2013 - ieeexplore.ieee.org
This paper presents a probabilistic model-based approach aimed at evaluating quantitative
measures to assess the security risks faced by an information system in operation. The …

3LSPG: Forensic tool evaluation by three layer stochastic process-based generation of data

Y Yannikos, F Franke, C Winter… - … Forensics: 4th International …, 2011 - Springer
Since organizations cannot prevent all criminal activities of employees by security
technology in practice, the application of IT forensic methods for finding traces in data is …

Stochastic modeling and evaluation for network security

C Lin, Y Wang, QL Li - CHINESE JOURNAL OF COMPUTERS …, 2005 - cjc.ict.ac.cn
Background Network systems are becoming more complex and larger, and specifically
network attacks and security destroy is also increasingly prevalent and multiple. Network …

一种基于图论的网络安全分析方法研究

张维明, 毛捍东, 陈锋 - 国防科技大学学报, 2008 - journal.nudt.edu.cn
随着信息技术安全问题的日益突出, 对网络系统进行安全分析日益重要. 提出了一种基于图论的
网络安全分析方法NEG-NSAM, 在进行网络参数抽象和脆弱性关联分析的基础上 …

[引用][C] 基于贝叶斯网络的网络安全评估方法研究

刘勃, 周荷琴 - 计算机工程, 2004