2013
DOI: 10.4304/jmm.8.4.439-446
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability Evaluation of Multimedia Subsystem Based on Complex Network

Abstract: IP multimedia subsystems bring huge security threats to the IMS-based next-generation networks although they bring IMS-based network integration and business ability enhancement. Therefore, the research on the vulnerability of IP multimedia subsystems attracts widespread attention recently. In this article, the security threats of next-generation core networks are discussed first. And then we analyze the vulnerability characteristics of IP multimedia subsystems. In order to evaluate the vulnerability of IP mul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 18 publications
(17 reference statements)
0
7
0
Order By: Relevance
“…Some decision tree algorithms such as RAINFOREST are only a frame, and the core center is SPRINT and other algorithms. They have the consistent accuracy [11][12].…”
Section: Data Read-write Operation Of the Algorithmmentioning
confidence: 92%
“…Some decision tree algorithms such as RAINFOREST are only a frame, and the core center is SPRINT and other algorithms. They have the consistent accuracy [11][12].…”
Section: Data Read-write Operation Of the Algorithmmentioning
confidence: 92%
“…So far we have mentioned dynamical processes used for risk assessment, but the domain of complex science is also wealthy in static methods originating from graph theory. Examples of such metrics include shortest paths [55]- [57], degree distribution [58], [59] or clustering coefficient [59]. In supply networks Reniers et al (2012) have studied systemic risk of the chemical industry, by developing the risk indexes based on the shortest path metric [60].…”
Section: Related Workmentioning
confidence: 99%
“…Laxe et al (2012) link betweenness centrality with relative geographical importance [58]. Nguyen et al (2013) use the metric for vulnerability assessment in power networks [82]; Tang (2013) for IP multimedia subsystems [59].…”
Section: A Node-level Metrics Overviewmentioning
confidence: 99%
“…As can be seen from Table 1 after obtaining the real-time monitoring signals, using the Eq. (2) -(5), to calculate the scope of waveform index, peak index, pulse index, margin index and kurtosis index are duplicate (namely, called composite fault), and the scope of the interval is large, it is difficult to distinguish dimensionless index interval between normal equipment and faulted equipment strictly [16,17]. In order to solve the above problem, this paper uses the four kinds of filter method of the part four, filter dimensionless index have been calculated, filter out some interference signals, to reduce the fault interval.…”
Section: Examples Of Complex Rotating Machinery Faultmentioning
confidence: 99%
“…Determining the fault zone of flow Dimensionless indexes combined with four kinds of filter, can filter out interference information effectively, to reduce the fault interval, and provide the effective basis for future fault diagnosis. In this paper, waveform index, peak index, pulse index, margin index and kurtosis index in the state of eccentric shaft, split shaft, curved shaft, no-symmetry shaft [16][17], crack shaft and normal shaft, eight state, totally use four kinds of filter of the paper, the result is shown in Figure 2 ~ 9, fault scope is shown in Table 2 As shown in Table 2 ~ 9 and Figure 2 ~ 9, the four filtering method can narrow down the interval effectively, and we can select different methods according to the different environment and different need. Where estimating stochastic dynamic system state, Kalman filtering may be used, this method is based on state space model of the system, using a moment before the state estimated value and current observed value to get the state estimated value for the next moment, achieving recursive, this method is suitable for computer implementation.…”
Section: Filteringmentioning
confidence: 99%