2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2016
DOI: 10.1109/dsn.2016.10
|View full text |Cite
|
Sign up to set email alerts
|

A Quantitative Methodology for Security Monitor Deployment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…In [8] Hardy et al proposed a targeted threat index that combined the sophistication of social engineering and technical attacks. In [9] Thakore proposed a set of metrics that included redundancy, confidence, coverage, and the cost to quantitatively evaluate deployments. In [10], Ekelhart et al looked at the attackers' behaviours and the attackers' strategies with a simulation-driven approach.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In [8] Hardy et al proposed a targeted threat index that combined the sophistication of social engineering and technical attacks. In [9] Thakore proposed a set of metrics that included redundancy, confidence, coverage, and the cost to quantitatively evaluate deployments. In [10], Ekelhart et al looked at the attackers' behaviours and the attackers' strategies with a simulation-driven approach.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In [8] Hardy et al proposed a targeted threat index that combined the sophistication of social engineering and technical attacks. In [9] Thakore proposed a set of metrics that included redundancy, confidence, coverage, and the cost to quantitatively evaluate deployments. In [10], Ekelhart et al looked at the attackers' behaviors and the attackers' strategies with a simulation-driven approach.…”
Section: Literature Reviewmentioning
confidence: 99%
“…One of them focuses on anomaly detection, especially increasing its accuracy, in some chosen security domain or part of the system. As an example, there are works on improvement of IDS/IPS [24], [26] or anomaly detection on the basis of network traffic analysis, e.g. [5], [12], [15].…”
Section: Iirelated Workmentioning
confidence: 99%