2022
DOI: 10.32604/iasc.2022.022569
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing the Big Data Security Through a Unified Decision-Making Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(20 citation statements)
references
References 20 publications
0
20
0
Order By: Relevance
“…The DMZ provides an additional layer of security to an organisation's local area network (LAN) denying the attacker direct access to Network 1. Differently from predictions techniques and algorithms used to infer knowledge as [32,33], our classifying approach is based on the observation of the related pivot attacks and the connectivity achieved by the adversary to infer different types of pivoting. The combination of numbered red bullets corresponds to distinct degrees of connectivity.…”
Section: Pivot Attack Classificationmentioning
confidence: 99%
See 1 more Smart Citation
“…The DMZ provides an additional layer of security to an organisation's local area network (LAN) denying the attacker direct access to Network 1. Differently from predictions techniques and algorithms used to infer knowledge as [32,33], our classifying approach is based on the observation of the related pivot attacks and the connectivity achieved by the adversary to infer different types of pivoting. The combination of numbered red bullets corresponds to distinct degrees of connectivity.…”
Section: Pivot Attack Classificationmentioning
confidence: 99%
“…The DMZ provides an additional layer of security to an organisation's local area network (LAN) denying the attacker direct access to Network 1. Differently from predictions techniques and algorithms used to infer knowledge as [32,33], our classifying approach is…”
Section: Pivot Attack Classificationmentioning
confidence: 99%
“…In practical applications, there are many types of risk factor identification methods [ 19 ], mainly including the following: (1) brainstorming method, (2) analysis process method [ 20 ], (3) analysis of relevant scenarios, (4) risk decomposition method [ 21 ], and (5) editing event tree method [ 22 ]. According to the actual situation of small- and medium-sized agency bookkeeping companies, this paper adopts the brainstorming method to identify the risk factors of these companies.…”
Section: Establishment Of the Risk Evaluation Index System For Small-...mentioning
confidence: 99%
“…(3) analysis of relevant scenarios, (4) risk decomposition method [21], and (5) editing event tree method [22].…”
Section: Establishment Of the Risk Evaluation Indexmentioning
confidence: 99%
“…The targets, which are most important for the software system, are collected from the partners by the requirement engineer [ 16 ] during the requirement engineering process, which is the 1 st phase of the software development life cycle, and then, while getting the requirement from the partner, the requirement engineer will record the targets indicated by the partner either orally or in a written document. And to achieve the targets set by the Partner, the requirement engineer will write so many approaches by which the requirement engineer can satisfy all the needs of the Partners, which is his utmost aim [ 17 ]. We can use any of the strategies (interrogation, creative thinking, examining, and meeting interrogation) to get the suggestion from the Partner.…”
Section: Introduction Of Identification Of Security Threats During Re...mentioning
confidence: 99%