2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) 2010
DOI: 10.1109/icacte.2010.5579740
|View full text |Cite
|
Sign up to set email alerts
|

Research the information security risk assessment technique based on Bayesian network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis [70]. The authors present a security risk analysis model with the objective of identifying the causal relationships between risk factors and analysing the complexity and uncertainty of the propagation of vulnerabilities.…”
Section: Model 3 (Mo3)mentioning
confidence: 99%
“…A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis [70]. The authors present a security risk analysis model with the objective of identifying the causal relationships between risk factors and analysing the complexity and uncertainty of the propagation of vulnerabilities.…”
Section: Model 3 (Mo3)mentioning
confidence: 99%
“…A multilayered hierarchical Bayesian network method was used in [13] to measure mobile phone security by describing risk communications and potential risk mining. However, this method describes only the connections between mobile applications and does not extend to the entire network, as proposed in [14]- [17] for Bayesian network-associated risk events.…”
Section: Related Workmentioning
confidence: 99%
“…In the past, university finance information system was a traditional hand university financial system; now, which have been ported to computer systems and the internet, computer statistics, analysis, and management of university's financial data. It greatly improves the automation of financial personnel in universities [2][3][4].…”
Section: Introductionmentioning
confidence: 99%