메뉴 건너뛰기




Volumn , Issue , 2010, Pages 952-960

Network security risk assessment using bayesian belief networks

Author keywords

Information security; Quantitative risk assessment; Risk modeling; Threat modeling

Indexed keywords

ASSESSMENT MODELS; BAYESIAN BELIEF NETWORKS; DECISION-MAKING SYSTEMS; ENGINEERING TASKS; INFORMATION SECURITY; IT PRODUCTS; PROBABILISTIC OUTPUT; QUANTITATIVE RISK ASSESSMENT; RISK MODELING; SECURITY RISK ASSESSMENTS; SOFTWARE DEVELOPMENT PROJECTS; THREAT MODELING;

EID: 78649260960     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SocialCom.2010.141     Document Type: Conference Paper
Times cited : (30)

References (20)
  • 3
    • 33646902682 scopus 로고    scopus 로고
    • Special systems: Overlooked sources of security risk?
    • E. E. Schultz, "Special systems: Overlooked sources of security risk?" Computers & Security, vol. 25, no. 3, p. 155, 2006.
    • (2006) Computers & Security , vol.25 , Issue.3 , pp. 155
    • Schultz, E.E.1
  • 8
    • 34248348339 scopus 로고    scopus 로고
    • Measuring, analyzing and predicting security vulnerabilities in software systems
    • May
    • O. H. Alhazmi, Y. K. Malaiya, and I. Ray, "Measuring, analyzing and predicting security vulnerabilities in software systems," Computers & Security, vol. 26, no. 3, pp. 219-228, May 2007.
    • (2007) Computers & Security , vol.26 , Issue.3 , pp. 219-228
    • Alhazmi, O.H.1    Malaiya, Y.K.2    Ray, I.3
  • 10
    • 33846813917 scopus 로고    scopus 로고
    • Information lifecycle security risk assessment: A tool for closing security gaps
    • R. Bernard, "Information lifecycle security risk assessment: A tool for closing security gaps," Computers & Security, vol. 26, no. 1, pp. 26-30, 2007.
    • (2007) Computers & Security , vol.26 , Issue.1 , pp. 26-30
    • Bernard, R.1
  • 11
    • 33947726366 scopus 로고    scopus 로고
    • Parameterisation and evaluation of a bayesian network for use in an ecological risk assessment
    • C. A. Pollino, O. Woodberry, A. Nicholson, K. Korb, and B. T. Hart, "Parameterisation and evaluation of a bayesian network for use in an ecological risk assessment," Environ. Model. Softw., vol. 22, no. 8, pp. 1140-1152, 2007.
    • (2007) Environ. Model. Softw. , vol.22 , Issue.8 , pp. 1140-1152
    • Pollino, C.A.1    Woodberry, O.2    Nicholson, A.3    Korb, K.4    Hart, B.T.5
  • 14
    • 35048893595 scopus 로고    scopus 로고
    • Results of classroom enterprise security assessment of five large enterprise networks
    • G. L. Wooley, "Results of classroom enterprise security assessment of five large enterprise networks," J. Comput. Small Coll., vol. 18, no. 3, pp. 185-195, 2003.
    • (2003) J. Comput. Small Coll. , vol.18 , Issue.3 , pp. 185-195
    • Wooley, G.L.1
  • 16
    • 34447521494 scopus 로고    scopus 로고
    • Vulnerability take grant (vtg): An efficient approach to analyze network vulnerabilities
    • August
    • H. R. Shahriar and R. Jalili, "Vulnerability take grant (vtg): An efficient approach to analyze network vulnerabilities," Computers & Security, vol. 26, pp. 349-360, August 2007.
    • (2007) Computers & Security , vol.26 , pp. 349-360
    • Shahriar, H.R.1    Jalili, R.2
  • 19
    • 0026374073 scopus 로고
    • Bayesian networks without tears
    • E. Charniak, "Bayesian networks without tears," AI Magazine, vol. 12, no. 4, pp. 50-63, 1991.
    • (1991) AI Magazine , vol.12 , Issue.4 , pp. 50-63
    • Charniak, E.1
  • 20
    • 70349438880 scopus 로고    scopus 로고
    • A concise cost analysis of Internet malware
    • S. Kondakci, "A concise cost analysis of Internet malware," Computers & Security, vol. 28, no. 7, pp. 648-659, 2009.
    • (2009) Computers & Security , vol.28 , Issue.7 , pp. 648-659
    • Kondakci, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.