2017
DOI: 10.22594/dau.16-760.24.02
|View full text |Cite
|
Sign up to set email alerts
|

Using Analytical Hierarchy and Analytical Network Processes to Create Cyber Security Metrics

Abstract: Authentication, authorization, and accounting are key access control measures that decision makers should consider when crafting a defense against cyber attacks. Two decision theory methodologies were compared.Analytical hierarchy and analytical network processes were applied to cyber security-related decisions to derive a measure of effectiveness for risk evaluation. A network/access mobile security use case was employed to develop a generalized application benchmarking framework. Three communities of interes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 23 publications
(25 reference statements)
0
3
0
Order By: Relevance
“…MCDM is crucial for several real life problems including cybersecurity. However, the discussion on the usability of decision theory against cyber threats is limited, which indicates the existence of a gap (Wilamowski et al 2017). Often, challenges rise during the evaluation of alternatives in terms of a set of deciding measures.…”
Section: Multi-criteria Decision-makingmentioning
confidence: 99%
See 2 more Smart Citations
“…MCDM is crucial for several real life problems including cybersecurity. However, the discussion on the usability of decision theory against cyber threats is limited, which indicates the existence of a gap (Wilamowski et al 2017). Often, challenges rise during the evaluation of alternatives in terms of a set of deciding measures.…”
Section: Multi-criteria Decision-makingmentioning
confidence: 99%
“…There is no doubt that decision making in this paper's context cannot be easily modeled because of dealing with human element and judgement. A wide range of mathematical methods of MCDM for evaluation and validation of alternatives exist, and embedded in, linear programming, integer programming, design of experiments, Bayesian networks (Wilamowski et al 2017). MCDM usually involve three steps when using numerical analysis of the alternatives: (1) identify alternatives to criteria, (2) attach numerical measures to the criteria and impact of alternatives, and (3) rank each alternative after processing numerical values (Triantaphyllou et al 1997).…”
Section: Multi-criteria Decision-makingmentioning
confidence: 99%
See 1 more Smart Citation