2015
DOI: 10.1016/j.procs.2015.07.530
|View full text |Cite
|
Sign up to set email alerts
|

A Perception Model of Spam Risk Assessment Inspired by Danger Theory of Artificial Immune Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Detecting threats and vulnerabilities to a particular asset, clarifying the risk, and assessing that risk exposure at a specified level are often referred to as risk assessment [40][41][42]. As a result, management must regularly and effectively review the quality of the risk assessment process [43,44] since it is becoming increasingly complicated as IT systems evolve, which may influence technical, physical, and administrative elements. Risk analysis is part of the risk assessment stage, defined as the process of determining the possibility of an undesired event occurring and the severity of that occurrence.…”
Section: Risk Assessmentmentioning
confidence: 99%
“…Detecting threats and vulnerabilities to a particular asset, clarifying the risk, and assessing that risk exposure at a specified level are often referred to as risk assessment [40][41][42]. As a result, management must regularly and effectively review the quality of the risk assessment process [43,44] since it is becoming increasingly complicated as IT systems evolve, which may influence technical, physical, and administrative elements. Risk analysis is part of the risk assessment stage, defined as the process of determining the possibility of an undesired event occurring and the severity of that occurrence.…”
Section: Risk Assessmentmentioning
confidence: 99%
“…The most prevalent malware used email to spread and logins by passwords to a system to steal confidential data. The Top 10 malicious programs spread by email presented as follow [ One type of threat that could lead to a hazardous situation and exploit vulnerabilities is spam when the probability of potential risk to happen is high [22]. For SMS spam management, three phases which are spam detection, classification, and severity determination level are dependent [23].…”
Section: Sms Spam Securitymentioning
confidence: 99%
“…With reference to [21], the spam management should be administered as proposed in risk management. In a developed and established standard of risk management [20] [22], this process usually consists of 4 essential phase; risk identification, risk assessment, risk response/treatment and risk monitoring.…”
Section: A An Integration Of Danger Theory and Risk Assessmentmentioning
confidence: 99%