메뉴 건너뛰기




Volumn , Issue , 2013, Pages 989-1000

Using network security index system to evaluate network security

Author keywords

Multi criteria decision making; Network security; Network security index system; Situation evaluation

Indexed keywords

COMPUTER CRIME; DECISION MAKING;

EID: 84891522105     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-642-38433-2_104     Document Type: Conference Paper
Times cited : (5)

References (15)
  • 3
    • 0347742772 scopus 로고    scopus 로고
    • Intrusion detection systems and multisensor data fusion
    • Bass T (2000) Intrusion detection systems and multisensor data fusion. Commun ACM 43(4):99-105
    • (2000) Commun ACM , vol.43 , Issue.4 , pp. 99-105
    • Bass, T.1
  • 5
    • 35048844325 scopus 로고    scopus 로고
    • The vulnerability assessment for active networks; Model, policy, procedures, and performance evaluations
    • Han Y, Yang J, Chang B, Na J, Chung T (2004) The vulnerability assessment for active networks; model, policy, procedures, and performance evaluations. Comput Sci Appl-ICCS: 191-198
    • (2004) Comput Sci Appl-ICCS , pp. 191-198
    • Han, Y.1    Yang, J.2    Chang, B.3    Na, J.4    Chung, T.5
  • 9
    • 84891506828 scopus 로고    scopus 로고
    • An overview. University of Twente, The Netherlands
    • Pras A (2000) NTOP-Network TOP. An overview. University of Twente, The Netherlands
    • (2000) NTOP-Network TOP
    • Pras, A.1
  • 10
    • 84891536729 scopus 로고    scopus 로고
    • Computational model of computer virus
    • Ren T (2001) Computational model of computer virus. Chin J Comput: 02
    • (2001) Chin J Comput , pp. 02
    • Ren, T.1
  • 12
    • 0041375490 scopus 로고    scopus 로고
    • Security considerations for remote electronic voting
    • Rubin A (2002) Security considerations for remote electronic voting. Commun ACM 45(12):44
    • (2002) Commun ACM , vol.45 , Issue.12 , pp. 44
    • Rubin, A.1
  • 13
    • 84865308076 scopus 로고    scopus 로고
    • Quantitative risk assessment model for network security
    • Shi L, Zhuang Y (2007) Quantitative risk assessment model for network security. Comput Eng Appl 43(018):146-149
    • (2007) Comput Eng Appl , vol.43 , Issue.18 , pp. 146-149
    • Shi, L.1    Zhuang, Y.2
  • 14
    • 3042850479 scopus 로고    scopus 로고
    • Study on evaluation for security situation of networked systems
    • Xiuzhen C, Qinghua Z, Xiaohong G, Chenguang L (2004) Study on Evaluation for Security Situation of Networked Systems. J Xi'an Jiaotong Univ 38(004):404-408
    • (2004) J Xi'an Jiaotong Univ , vol.38 , Issue.4 , pp. 404-408
    • Xiuzhen, C.1    Qinghua, Z.2    Xiaohong, G.3    Chenguang, L.4
  • 15
    • 65349134119 scopus 로고    scopus 로고
    • A network security situational awareness model based on log audit and performance correction
    • Yong W, Yifeng L (2009) A network security situational awareness model based on log audit and performance correction. Chin J Comput 32(4):763-772
    • (2009) Chin J Comput , vol.32 , Issue.4 , pp. 763-772
    • Yong, W.1    Yifeng, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.