2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity) 2015
DOI: 10.1109/smartcity.2015.222
|View full text |Cite
|
Sign up to set email alerts
|

Research on Behavior Trust Based on Bayesian Inference in Trusted Computing Networks

Abstract: Recent years have seen explosive growth in information security problem. Trusted computing is increasingly used in the fields of information security. The basic idea of trusted computing is different from traditional security method. In other words, system abstracts normal behavior and compare with real-time behavior. Most of the current research focuses on static integrity metrics. However, it is not enough for dynamic measurement in trusted computing environment. In this paper, we present an efficient identi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…Many articles focused on the use of cyber activity behaviors, login events, or the combination of login events with other features [55][56][57][58][59][60] using many different techniques. Nikolai and Wang [55] proposed a solution for data theft in Infrastructure as a Service IAAS Clouds; the k-nearest neighbor (KNN) is used to detect data theft in Clouds.…”
Section: Cyber Activity Behaviormentioning
confidence: 99%
See 3 more Smart Citations
“…Many articles focused on the use of cyber activity behaviors, login events, or the combination of login events with other features [55][56][57][58][59][60] using many different techniques. Nikolai and Wang [55] proposed a solution for data theft in Infrastructure as a Service IAAS Clouds; the k-nearest neighbor (KNN) is used to detect data theft in Clouds.…”
Section: Cyber Activity Behaviormentioning
confidence: 99%
“…Roberts et al [56] provided a detection mechanism to counter insider threats in critical networks. W. Liu et al's [58] used the Bayesian networks (BNs) and novel modeling approach for the performance of insider threat detection. Research methodology was proposed to provide an approach for the construction, assessment, and optimization of the insider user normal behavior model.…”
Section: Cyber Activity Behaviormentioning
confidence: 99%
See 2 more Smart Citations