2004
DOI: 10.1007/978-3-540-25969-5_101
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent Assessment of Distributed Security in TCP/IP Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2008
2008
2017
2017

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 4 publications
0
2
0
1
Order By: Relevance
“…Enterprises always spend a lot of money to buy or upgrade protection product, but they often lack a knowledge base or do not involve all security issues, so they should invest a lot of energy to deal with of information security incidents repeatedly [3]. One of our ongoing activities on security solutions aim to integrate existing security guidelines, best practices, security standards and existing solutions [4].…”
Section: Background and Problem Analysismentioning
confidence: 99%
“…Enterprises always spend a lot of money to buy or upgrade protection product, but they often lack a knowledge base or do not involve all security issues, so they should invest a lot of energy to deal with of information security incidents repeatedly [3]. One of our ongoing activities on security solutions aim to integrate existing security guidelines, best practices, security standards and existing solutions [4].…”
Section: Background and Problem Analysismentioning
confidence: 99%
“…定量评估通常指运用数量指标对风险进行评估, 优点是评估结果更直观、更客观. 相关工 作如: 李涛和王益丰等人 [12,13] 提出了一个基于免疫的网络安全风险定量检测模型和方法; 陈 秀真等人 [14] 提出了一种层次化网络安全威胁态势量化评估方法; Cardoso等人 [15] [16] , 并在此基础上, 首次提出了一个风险传播模型来描述网络客观的风险状态及其转移过 程 [17] .…”
Section: 安全风险评估方法 他们将大规模异构系统划分成若干子系统 然后采用可向导的自顶向下unclassified
“…Finally, from the assessment methods, Bilar [12] compared the security event data caused by the modified time of bug and patch and quantitatively analyzed the risk of information system network. Cardoso and Freire [13] proposed a quantification evaluation method of an agent-based distributed system. An agent was utilized to monitor the host security statuses of a subnet or other nodes for evaluation.…”
Section: Introductionmentioning
confidence: 99%