2018
DOI: 10.1109/access.2018.2800664
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Information Security Risk Assessments Method for Cyber-Physical-Social Computing and Networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0
2

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 37 publications
(13 citation statements)
references
References 30 publications
0
11
0
2
Order By: Relevance
“…Compared with the standard BPNN, BPNN optimized by genetic algorithm (GA-BP) neural network has lower simulation error and better fitting effect. Li et al 27 and Dong et al 28 use cuckoo search algorithm to optimize BPNN neural network parameters to avoid BP falling into local extreme values, thereby improving training speed and evaluation accuracy. Compared with genetic-BPNN algorithm, it has training time, error, and accuracy.…”
Section: Related Workmentioning
confidence: 99%
“…Compared with the standard BPNN, BPNN optimized by genetic algorithm (GA-BP) neural network has lower simulation error and better fitting effect. Li et al 27 and Dong et al 28 use cuckoo search algorithm to optimize BPNN neural network parameters to avoid BP falling into local extreme values, thereby improving training speed and evaluation accuracy. Compared with genetic-BPNN algorithm, it has training time, error, and accuracy.…”
Section: Related Workmentioning
confidence: 99%
“…They could check the reasoning and experience can be borrowed from safety area on how to avoid and detecting fallacious reasoning in the arguments [30]. This can also help feedback into the organizations' risk assessment procedure as it usually requires the causal analysis of the incidents as well as the security recommendations to mitigate the risks [49,50,51,52,53]. The use of a graphical notation provides stakeholders with an overview of key issues before being forced to read the hundreds of pages of detailed prose that increasingly documents the findings of security investigations.…”
Section: Lessons Learned Sharing Using Diagramsmentioning
confidence: 99%
“…Further they have concentrate on security factors. Senyu Li et al [2] have found delay speed in the developed neural network and information security is more dangerous due to the changing world of IoT. For indentifying risk factors in cyber-physical system and network most of the researcher suggested Bayesian Network and Wavelet Neural Network (WNN).…”
Section: Cyber Security In Cyber Physical Systemmentioning
confidence: 99%