2014
DOI: 10.1007/s11859-014-1033-1
|View full text |Cite
|
Sign up to set email alerts
|

Network security situation evaluation based on modified D-S evidence theory

Abstract: With the rapid development of global information and the increasing dependence on network for people, network security problems are becoming more and more serious. By analyzing the existing security assessment methods, we propose a network security situation evaluation system based on modified D − S evidence theory is proposed. Firstly, we give a modified D − S evidence theory to improve the reliability and rationality of the fusion result and apply the theory to correlation analysis. Secondly, the attack succ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…It is an acyclic graphical pattern describing the probabilistic relationships of the dependency among stochastic covariates and is the essential graph used in causal analysis 12 . It offers us a clear and succinct graphical model to illustrate interesting relationships between elements and allows for more clarity and easier understanding of intricate associations between elements 13 . The Bayesian network has many nodes and directed maps whose known target node’s location can be determined by a given solution 14 .…”
Section: Proposed Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…It is an acyclic graphical pattern describing the probabilistic relationships of the dependency among stochastic covariates and is the essential graph used in causal analysis 12 . It offers us a clear and succinct graphical model to illustrate interesting relationships between elements and allows for more clarity and easier understanding of intricate associations between elements 13 . The Bayesian network has many nodes and directed maps whose known target node’s location can be determined by a given solution 14 .…”
Section: Proposed Methodsmentioning
confidence: 99%
“…12 It offers us a clear and succinct graphical model to illustrate interesting relationships between elements and allows for more clarity and easier understanding of intricate associations between elements. 13 The Bayesian network has many nodes and directed maps whose known target node's location can be determined by a given solution. 14 A Bayesian network links the introduction of pie charts to variables, so the logical relationships between variables can be easily represented.…”
Section: Principle Of Bayesian Detection Of Network Securitymentioning
confidence: 99%
“…Defects of Dempster fusion rule. As a method of uncertain knowledge reasoning, D-S evidence theory has been widely applied on uncertain information fusing and reasoning [4] [5] . However, there are some limitations in the application of the conventional D-S evidence theory.…”
Section: D-s Evidence Theorymentioning
confidence: 99%
“…Border mismatches render high discrimination factor (DF) with a median of 124 which is superior than currently reported results. [17] Probe-sink system [18] was employed to further enhance DF allowing for detecting VAF down to 0.1%. We successfully used the probes to detect SNVs of SARS-CoV-2 and cancer genes with high confidence in plasmid clones (Scheme 1).…”
Section: Introductionmentioning
confidence: 99%