Analysis framework of network security situational awareness and comparison of implementation methods

Y Li, G Huang, C Wang, Y Li - EURASIP Journal on Wireless …, 2019 - Springer
Abstract Information technology has penetrated into all aspects of politics, economy, and
culture of the whole society. The information revolution has changed the way of …

Model-based evaluation: from dependability to security

DM Nicol, WH Sanders… - IEEE Transactions on …, 2004 - ieeexplore.ieee.org
The development of techniques for quantitative, model-based evaluation of computer system
dependability has a long and rich history. A wide array of model-based evaluation …

Möbius 2.3: An extensible tool for dependability, security, and performance evaluation of large and complex system models

T Courtney, S Gaonkar, K Keefe… - 2009 IEEE/IFIP …, 2009 - ieeexplore.ieee.org
Mobius 2.3 is an extensible dependability, security, and performance modeling environment
for large-scale discrete-event systems. It provides multiple model formalisms and solution …

Power system reliability analysis with intrusion tolerance in SCADA systems

Y Zhang, L Wang, Y Xiang - IEEE Transactions on Smart Grid, 2015 - ieeexplore.ieee.org
By intruding on the substations and control center of the supervisory control and data
acquisition system, trip commands can be sent to intelligent electronic devices that control …

Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile ad hoc networks

JH Cho, R Chen, PG Feng - IEEE Transactions on Reliability, 2010 - ieeexplore.ieee.org
For mission-oriented mobile group systems designed to continue mission execution in
hostile environments in the presence of security attacks, it is critical to properly deploy …

[PDF][PDF] On stochastic modeling for integrated security and dependability evaluation.

K Sallhammar, BE Helvik, SJ Knapskog - J. Networks, 2006 - academia.edu
This paper presents a new approach to integrated security and dependability evaluation,
which is based on stochastic modeling techniques. Our proposal aims to provide operational …

A stochastic model of attack process for the evaluation of security metrics

J Almasizadeh, MA Azgomi - Computer Networks, 2013 - Elsevier
To trust a computer system that is supposed to be secure, it is necessary to predict the
degree to which the system's security level can be achieved when operating in a specific …

Understanding dynamic denial of service attacks in mobile ad hoc networks

F Xing, W Wang - MILCoM 2006-2006 IEEE Military …, 2006 - ieeexplore.ieee.org
In mobile ad hoc networks (MANETs), denial of service (DoS) attacks not only consume the
scarce system resources, such as bandwidth, battery energy, or CPU cycles, but also isolate …

Using stochastic game theory to compute the expected behavior of attackers

K Sallhammar, SJ Knapskog… - 2005 Symposium on …, 2005 - ieeexplore.ieee.org
This paper presents ongoing work on using stochastic game theory as a mathematical tool
for computing the expected behavior of attackers. The possible use of the Nash Equilibrium …

Des relations entre sûreté et sécurité

L Piètre-Cambacédès - 2010 - pastel.hal.science
Historiquement séparées, sûreté et sécurité sont pourtant deux problématiques intimement
liées. Si les trop rares initiatives de décloisonnement, adaptant notamment des outils d'un …