메뉴 건너뛰기




Volumn 14, Issue 1, 2003, Pages 1-13

A possibility theory framework for security evaluation in national infrastructure protection

Author keywords

Abuse and crime; Battle space illumination; Information warfare; Intrusion detection; IS security; Military applications; National infrastructure protection; Possibility theory

Indexed keywords

COMPUTER NETWORKS; INFORMATION RETRIEVAL; PROBABILITY; SECURITY OF DATA;

EID: 0041379357     PISSN: 10638016     EISSN: None     Source Type: Journal    
DOI: 10.4018/jdm.2003040101     Document Type: Article
Times cited : (21)

References (22)
  • 1
    • 0041489879 scopus 로고    scopus 로고
    • Clinton, IT execs huddle on anti-hack-attack plan
    • Bacheldor, B. (2000). Clinton, IT execs huddle on anti-hack-attack plan. Informationweek (774), 167.
    • (2000) Informationweek , Issue.774 , pp. 167
    • Bacheldor, B.1
  • 2
    • 0002082632 scopus 로고
    • The developmental duality of information systems security
    • Baskerville, R. (1992). The developmental duality of information systems security. The Journal of Management Systems, 4(1), 1-12.
    • (1992) The Journal of Management Systems , vol.4 , Issue.1 , pp. 1-12
    • Baskerville, R.1
  • 3
    • 84900087781 scopus 로고    scopus 로고
    • A framework for evaluation of security provided by firewalls
    • Atlanta: Georgia State University
    • Baskerville, R., & Portougal, V. (2000). A Framework for Evaluation of Security Provided by Firewalls (Working Paper). Atlanta: Georgia State University.
    • (2000) Working Paper
    • Baskerville, R.1    Portougal, V.2
  • 4
    • 0347742772 scopus 로고    scopus 로고
    • Intrusion detection systems and multisensor data fusion
    • Bass, T. (2000). Intrusion detection systems and multisensor data fusion. Communications of the ACM, 43(4), 99-105.
    • (2000) Communications of the ACM , vol.43 , Issue.4 , pp. 99-105
    • Bass, T.1
  • 5
    • 0035665469 scopus 로고    scopus 로고
    • A comparison of intrusion detection systems
    • Biermann, E., Cloete, E., & Venter, L. M. (2001). A comparison of intrusion detection systems. Computers & Security, 20(8), 676-683.
    • (2001) Computers & Security , vol.20 , Issue.8 , pp. 676-683
    • Biermann, E.1    Cloete, E.2    Venter, L.M.3
  • 6
    • 0041489880 scopus 로고
    • Montvale, NJ: National Association of Accountants
    • Corr, A. (1983). The Capital Expenditure Decision. Montvale, NJ: National Association of Accountants.
    • (1983) The Capital Expenditure Decision
    • Corr, A.1
  • 7
    • 0041489878 scopus 로고    scopus 로고
    • A digital D-day?
    • August 31 (3593 Industrial/Technology Edition)
    • Crock, S. (1998). A digital D-day? Business Week, August 31 (3593 Industrial/Technology Edition), 15.
    • (1998) Business Week , pp. 15
    • Crock, S.1
  • 10
    • 0034825084 scopus 로고    scopus 로고
    • NIDS - Pattern search vs. protocol decode
    • Graham, R. (2001). NIDS - Pattern search vs. Protocol decode. Computers & Security, 20(1), 37-41.
    • (2001) Computers & Security , vol.20 , Issue.1 , pp. 37-41
    • Graham, R.1
  • 11
  • 12
    • 0041990843 scopus 로고    scopus 로고
    • Sketching a national information warfare defense plan
    • Munro, N. (1996). Sketching a national information warfare defense plan. Communications of the ACM, 39(11), 15-17.
    • (1996) Communications of the ACM , vol.39 , Issue.11 , pp. 15-17
    • Munro, N.1
  • 13
    • 0042992516 scopus 로고    scopus 로고
    • Protecting the infrastructures
    • Neumann, P. G. (1998). Protecting the infrastructures. Communications of the ACM, 41(1), 128.
    • (1998) Communications of the ACM , vol.41 , Issue.1 , pp. 128
    • Neumann, P.G.1
  • 14
  • 18
    • 0000010513 scopus 로고    scopus 로고
    • Network based intrusion detection: A review of technologies
    • Richards, K. (1999). Network based intrusion detection: A review of technologies. Computers & Security, 18(8), 671-682.
    • (1999) Computers & Security , vol.18 , Issue.8 , pp. 671-682
    • Richards, K.1
  • 19
    • 0041990842 scopus 로고    scopus 로고
    • New tool makes attacks undetectable
    • Schultz, E. (2002). New tool makes attacks undetectable. Computers & Security, 21(4), 301-302.
    • (2002) Computers & Security , vol.21 , Issue.4 , pp. 301-302
    • Schultz, E.1
  • 21
    • 49349133217 scopus 로고
    • Fuzzy Sets as a basis for a theory of possibility
    • Zadeh, L. A. (1978). Fuzzy Sets as a basis for a theory of possibility. Fuzzy Sets Systems, 1, 3-28.
    • (1978) Fuzzy Sets Systems , vol.1 , pp. 3-28
    • Zadeh, L.A.1
  • 22
    • 0040431304 scopus 로고    scopus 로고
    • Data mining for network intrusion detection: A comparison of alternative methods
    • Zhu, D., Premkumar, G., Zhang, X., & Chu, C.-H. (2001). Data mining for network intrusion detection: A comparison of alternative methods. Decision Sciences, 32(4), 635-660.
    • (2001) Decision Sciences , vol.32 , Issue.4 , pp. 635-660
    • Zhu, D.1    Premkumar, G.2    Zhang, X.3    Chu, C.-H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.