2018
DOI: 10.1007/s11042-017-5602-0
|View full text |Cite
|
Sign up to set email alerts
|

Security risk situation quantification method based on threat prediction for multimedia communication network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…Likewise, Deb and Roy [16] present a mathematical implementation to identify the status of the different hosts on the network. On the other hand, Hu et al [17] propose two algorithms. The first algorithm aims to provide comprehensive predictive information with the threat scenario.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Likewise, Deb and Roy [16] present a mathematical implementation to identify the status of the different hosts on the network. On the other hand, Hu et al [17] propose two algorithms. The first algorithm aims to provide comprehensive predictive information with the threat scenario.…”
Section: Discussionmentioning
confidence: 99%
“…The CVSS and the Bayesian network are robust methodologies for determining the mutual relationship between vulnerabilities and prioritizing the effective care process. On the other hand, Hu et al [17] propose two algorithms, the threat prediction algorithm based on a dynamic Bayesian graph and the security risk quantification algorithm based on threat prediction. The first algorithm aims to provide comprehensive predictive information under a specific threat scenario.…”
Section: State Of the Art Of Current Vulnerability Prioritizationmentioning
confidence: 99%
See 1 more Smart Citation
“…is method of user identification is relatively easy, but it is not secure, and the password is easy to be disclosed. erefore, with the development of database applications, password authentication, digital authentication, smart card authentication, and personal identity authentication are also introduced, which improves the security of the system within a limited scope [9,10].…”
Section: Commonly Used Data Algorithm Encryption Formula and Measuresmentioning
confidence: 99%
“…is method of user identification is relatively easy, but it is not secure, and the password is easy to be disclosed. erefore, with the development of database applications, password authentication, digital authentication, smart card authentication, and personal identity authentication are also introduced, which improves the security of the system within a limited scope [9,10].…”
Section: Commonly Used Data Algorithm Encryption Formula and Measuresmentioning
confidence: 99%