메뉴 건너뛰기




Volumn , Issue , 2008, Pages 490-493

Using hidden markov models to evaluate the real-time risks of network

Author keywords

Continuous time hidden Markov model; Multi perceptive evaluation; Real time risk management

Indexed keywords

CONTINUOUS TIME; CONTINUOUS TIME HIDDEN MARKOV MODEL; INTEGRATED ANALYSIS; MULTI-PERCEPTIVE EVALUATION; NETWORK ENVIRONMENTS; QUANTITATIVE ANALYSIS; REAL-TIME RISK MANAGEMENT; RISK EVALUATION; RISK PREDICTIONS; SAFETY MEASURES; SIMULATION RESULT; SYSTEM RISK; SYSTEM SECURITY; THREE PHASIS;

EID: 67649682148     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/KAMW.2008.4810531     Document Type: Conference Paper
Times cited : (16)

References (10)
  • 3
    • 35048879636 scopus 로고    scopus 로고
    • A. Gehani and G. Kedem, Rheostat: Real-time risk management, In Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection, RAID 2004, Sophia Antipolis, France, September 15-17, 2004, pp. 296-314. Springer, 2004.
    • A. Gehani and G. Kedem, "Rheostat: Real-time risk management," In Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection, RAID 2004, Sophia Antipolis, France, September 15-17, 2004, pp. 296-314. Springer, 2004.
  • 4
    • 67649745197 scopus 로고    scopus 로고
    • Information security management -Part 1:Code of practice for information security management ISO/IEC 17799:2005/Cor 1
    • ISO/IEC 17799-2000
    • ISO/IEC 17799-2000 Information security management -Part 1:Code of practice for information security management ISO/IEC 17799:2005/Cor 1:2007
    • (2007)
  • 5
    • 3042716335 scopus 로고    scopus 로고
    • Intrusion Detection Systems and Multi-sensor Data Fusion :Creating Cyberspace Situation Awareness
    • Bass T, "Intrusion Detection Systems and Multi-sensor Data Fusion :Creating Cyberspace Situation Awareness", Communications of the ACM
    • Communications of the ACM
    • Bass, T.1
  • 8
    • 67649765770 scopus 로고    scopus 로고
    • A. Arnes, F. Valeur and G. Vigna et., Using hidden markov models to evaluate the risk of intrusions, In Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection, RAID 2006, Hamburg, Germany, September 2006.
    • A. Arnes, F. Valeur and G. Vigna et., "Using hidden markov models to evaluate the risk of intrusions," In Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection, RAID 2006, Hamburg, Germany, September 2006.
  • 9
    • 0024610919 scopus 로고
    • A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition
    • February
    • Lawrence R. Rabiner, "A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition," Proceedings of the IEEE, 77 (2), p. 257-286, February 1989.
    • (1989) Proceedings of the IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.R.1
  • 10
    • 43249094711 scopus 로고    scopus 로고
    • Hidden Markov Model (HMM) Toolbox for Matlab, Last updated, 8 June
    • Hidden Markov Model (HMM) Toolbox for Matlab, Written by Kevin Murphy, 1998. Last updated, 8 June 2005.
    • (2005) Written by Kevin Murphy, 1998


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.