메뉴 건너뛰기




Volumn 7, Issue 3, 2011, Pages 217-239

Automatic security assessment for next generation wireless mobile networks

Author keywords

active networks; analytic hierarchy process; Dynamic access control; multiple criteria decision analysis; nomadic computing; security assessment; security audit; ubiquitous networking

Indexed keywords

ACTIVE NETWORKS; AUTHENTICATION; DECISION THEORY; HIERARCHICAL SYSTEMS; KNOWLEDGE BASED SYSTEMS; RATING; SECURITY SYSTEMS; TELECOMMUNICATION EQUIPMENT; WI-FI;

EID: 80052642192     PISSN: 1574017X     EISSN: None     Source Type: Journal    
DOI: 10.3233/MIS-2011-0119     Document Type: Article
Times cited : (34)

References (36)
  • 1
    • 51349093483 scopus 로고    scopus 로고
    • A novel quantitative approach formeasuring network security
    • IEEE
    • M.S. Ahmed, E.Al-Shaer and L.Khan, A Novel Quantitative Approach ForMeasuring Network Security, In INFOCOM, pages 1957-1965. IEEE, 2008.
    • (2008) INFOCOM , pp. 1957-1965
    • Ahmed, M.S.1    Al-Shaer, E.2    Khan, L.3
  • 2
    • 35248825128 scopus 로고    scopus 로고
    • Danger theory: The link between AIS and IDS?
    • J. Timmis, P.J. Bentley and E. Hart, eds of Lecture Notes in Computer Science Springer
    • U. Aickelin, P.J. Bentley, S. Cayzer, J. Kim and J. McLeod, Danger Theory: The Link between AIS and IDS? in: ICARIS, J. Timmis, P.J. Bentley and E. Hart, eds, volume 2787 of Lecture Notes in Computer Science, pages 147-155. Springer, 2003.
    • (2003) ICARIS , vol.2787 , pp. 147-155
    • Aickelin, U.1    Bentley, P.J.2    Cayzer, S.3    Kim, J.4    McLeod, J.5
  • 8
    • 4143058053 scopus 로고    scopus 로고
    • Using trust and risk in role-based access control policies
    • Trent Jaeger and Elena Ferrari, editors ACM
    • N. Dimmock, A. Belokosztolszki, D.M. Eyers, J. Bacon and K. Moody, Using trust and risk in role-based access control policies, In Trent Jaeger and Elena Ferrari, editors, SACMAT, pages 156-162. ACM, 2004.
    • (2004) SACMAT , pp. 156-162
    • Dimmock, N.1    Belokosztolszki, A.2    Eyers, D.M.3    Bacon, J.4    Moody, K.5
  • 9
    • 77952316216 scopus 로고    scopus 로고
    • Accurate mobility modeling and location prediction based on pattern analysis of handover series in mobile networks
    • P. F̈ul̈op, S. Imre, S. Szab́o and T. Sźalka, Accurate mobility modeling and location prediction based on pattern analysis of handover series in mobile networks, Mobile Information Systems 5(3) (2009), 255-289.
    • (2009) Mobile Information Systems , vol.5 , Issue.3 , pp. 255-289
    • F̈ul̈op, P.1    Imre, S.2    Szab́o, S.3    Sźalka, T.4
  • 10
    • 78650922496 scopus 로고    scopus 로고
    • Extending mobility to publish/subscribe systems using a pro-active caching approach
    • A. Gaddah and T. Kunz, Extending mobility to publish/subscribe systems using a pro-active caching approach, Mobile Information Systems 6(4) (2010), 293-324.
    • (2010) Mobile Information Systems , vol.6 , Issue.4 , pp. 293-324
    • Gaddah, A.1    Kunz, T.2
  • 14
  • 15
    • 1642309744 scopus 로고    scopus 로고
    • Dynamic access control through petri net workflows
    • IEEE Computer Society
    • K. Knorr, Dynamic Access Control through Petri Net Workflows, In ACSAC, pages 159-167. IEEE Computer Society, 2000.
    • (2000) ACSAC , pp. 159-167
    • Knorr, K.1
  • 16
    • 80052143103 scopus 로고    scopus 로고
    • Lessons learned in using live red teams in ia experiments
    • IEEE Computer Society
    • D. Levin, Lessons learned in using live red teams in ia experiments, In DISCEX (1), pages 110-119. IEEE Computer Society, 2003.
    • (2003) DISCEX , vol.1 , pp. 110-119
    • Levin, D.1
  • 21
    • 80052614993 scopus 로고    scopus 로고
    • Immune multiagent system for network intrusion detection using non-linear classification algorithm
    • M.E. Mohamed, B.B. Samir and A. Abdullah, Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm, International Journal of Computer Applications 12(7) (2010), 7-12.
    • (2010) International Journal of Computer Applications , vol.12 , Issue.7 , pp. 7-12
    • Mohamed, M.E.1    Samir, B.B.2    Abdullah, A.3
  • 24
    • 80052622942 scopus 로고    scopus 로고
    • Automated detection and containment of worms and viruses into heterogeneous networks: A simple network immune system
    • May
    • F. Palmieri and U. Fiore, Automated detection and containment of worms and viruses into heterogeneous networks: a simple network immune system, Int J Wire Mob Comput 2 (May 2007), 47-58.
    • (2007) Int J Wire Mob Comput , vol.2 , pp. 47-58
    • Palmieri, F.1    Fiore, U.2
  • 25
    • 77956393826 scopus 로고    scopus 로고
    • Network anomaly detection through nonlinear analysis
    • F. Palmieri and U. Fiore, Network anomaly detection through nonlinear analysis, Computers & Security 29(7) (2010), 737-755.
    • (2010) Computers & Security , vol.29 , Issue.7 , pp. 737-755
    • Palmieri, F.1    Fiore, U.2
  • 27
    • 77952908184 scopus 로고    scopus 로고
    • Routing of internal MANET traffic over external networks
    • V. Pham, E. Larsen, Ø. Kure and P. Engelstad, Routing of internal MANET traffic over external networks, Mobile Information Systems 5(3) (2009), 291-311.
    • (2009) Mobile Information Systems , vol.5 , Issue.3 , pp. 291-311
    • Pham, V.1    Larsen, E.2    Kure Ø3    Engelstad, P.4
  • 30
    • 29044443641 scopus 로고    scopus 로고
    • Decision making - The Analytic Hierarchy and Network Processes (AHP/ANP)
    • T.L. Saaty, Decision making-The Analytic Hierarchy and Network Processes (AHP/ANP), Journal of Systems Science and Systems Engineering 13 (2004), 1-35. 10.1007/s11518-006-0151-5. (Pubitemid 38615199)
    • (2004) Journal of Systems Science and Systems Engineering , vol.13 , Issue.1 , pp. 1-35
    • Saaty, T.L.1
  • 32
    • 78651283993 scopus 로고    scopus 로고
    • Network security situation prediction using artificial immune system and phase space reconstruction
    • Y.Q. Shi, T. Li,W. Chen and Y.M. Fu, Network Security Situation Prediction Using Artificial Immune System and Phase Space Reconstruction, Applied Mechanics and Materials 44-47 (2011), 3662-3666.
    • (2011) Applied Mechanics and Materials , vol.44-47 , pp. 3662-3666
    • Shi, Y.Q.1    Liw. Chen, T.2    Fu, Y.M.3
  • 35
    • 0242456725 scopus 로고    scopus 로고
    • Dynamic and risk-aware network access management
    • ACM
    • L. Teo, G.-J. Ahn and Y. Zheng, Dynamic and risk-aware network access management. In SACMAT, pages 217-230. ACM, 2003.
    • (2003) SACMAT , pp. 217-230
    • Teo, L.1    Ahn, G.-J.2    Zheng, Y.3
  • 36
    • 84988603769 scopus 로고
    • Towards a task-based paradigm for flexible and adaptable access control in distributed applications
    • New York, NY, USA ACM
    • R.K. Thomas and R.S. Sandhu, Towards a task-based paradigm for flexible and adaptable access control in distributed applications, In Proceedings on the 1992-1993 workshop on New security paradigms, NSPW '92-93, pages 138-142, New York, NY, USA, 1993. ACM.
    • (1993) Proceedings on the 1992-1993 Workshop on New Security Paradigms, NSPW , pp. 138-142
    • Thomas, R.K.1    Sandhu, R.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.