I-HMM-Based Multidimensional Network Security Risk Assessment
暂无分享,去创建一个
Xiaohui Kuang | Jingjing Hu | Zhiyu Shi | Dongsheng Hu | Shuangshuang Guo | Fankun Meng | Xiaohui Kuang | Jingjing Hu | Fanku Meng | Zhiyu Shi | Shuangshuang Guo | Dongsheng Hu
[1] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[2] Igor V. Kotenko,et al. CVSS-based Probabilistic Risk Assessment for Cyber Situational Awareness and Countermeasure Selection , 2017, 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP).
[3] Yu Zhang,et al. A payload-dependent packet rearranging covert channel for mobile VoIP traffic , 2018, Inf. Sci..
[4] Yu Zhang,et al. Research on QoS service composition based on coevolutionary genetic algorithm , 2018, Soft Comput..
[5] Liehuang Zhu,et al. A packet-reordering covert channel over VoLTE voice and video traffics , 2019, J. Netw. Comput. Appl..
[6] Chunjie Zhou,et al. Application of Bayesian network to data-driven cyber-security risk assessment in SCADA networks , 2017, 2017 27th International Telecommunication Networks and Applications Conference (ITNAC).
[7] Yuanzhang Li,et al. A High-Imperceptibility and Histogram-Shifting Data Hiding Scheme for JPEG Images , 2019, IEEE Access.
[8] Longfei Wu,et al. EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid , 2019, Science China Information Sciences.
[9] Yong Gan,et al. A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application , 2018, IEEE Access.
[10] Chen Liang,et al. A root privilege management scheme with revocable authorization for Android devices , 2018, J. Netw. Comput. Appl..
[11] Chen Liang,et al. Building covert timing channels by packet rearrangement over mobile networks , 2018, Inf. Sci..
[12] Gaute Wangen,et al. Information Security Risk Assessment: A Method Comparison , 2017, Computer.
[13] Leandros A. Maglaras,et al. Vulnerability Analysis of Network Scanning on SCADA Systems , 2018, Secur. Commun. Networks.
[14] Lu Liu,et al. A hierarchical group key agreement protocol using orientable attributes for cloud computing , 2019, Inf. Sci..
[15] Yong Gan,et al. Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication , 2019, IEEE Access.
[16] Hou Di,et al. Network security situation evaluation method based on attack intention recognition , 2015, 2015 4th International Conference on Computer Science and Network Technology (ICCSNT).
[17] Przemysław Klęsk,et al. FPGA implementation of logarithmic versions of Baum-Welch and Viterbi algorithms for reduced precision hidden Markov models , 2017 .
[18] Changzhen Hu,et al. Establishing a software defect prediction model via effective dimension reduction , 2019, Inf. Sci..
[19] Yuan Liu,et al. Network security risk assessment method based on HMM and attack graph model , 2016, 2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).
[20] Xiaoyan Li,et al. Network security situation assessment based on HMM-MPGA , 2016, 2016 2nd International Conference on Information Management (ICIM).
[21] Xiaojiang Du,et al. Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet , 2007, IEEE Communications Magazine.
[22] Chen Liang,et al. A sensitive network jitter measurement for covert timing channels over interactive traffic , 2018, Multimedia Tools and Applications.
[23] Wei Chen,et al. An Improved Information Security Risk Assessments Method for Cyber-Physical-Social Computing and Networking , 2018, IEEE Access.
[24] Tang Guangming,et al. A network security situation assessment method based on attack intention perception , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).
[25] T. Hamid,et al. Cyber Security Risk Evaluation Research Based on Entropy Weight Method , 2016, 2016 9th International Conference on Developments in eSystems Engineering (DeSE).
[26] Xiangliang Zhang,et al. Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers , 2018, Future Gener. Comput. Syst..
[27] Xiaohui Kuang,et al. Boosting Targeted Black-Box Attacks via Ensemble Substitute Training and Linear Augmentation , 2019, Applied Sciences.
[28] Xianmin Wang,et al. Building packet length covert channel over mobile VoIP traffics , 2018, J. Netw. Comput. Appl..
[29] Ganthan Narayana Samy,et al. Information Security Risk Assessment Framework for Cloud Computing Environment Using Medical Research Design and Method , 2018 .
[30] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[31] Jin Li,et al. The security of machine learning in an adversarial setting: A survey , 2019, J. Parallel Distributed Comput..
[32] Jindong Li,et al. Network Security Risk Assessment Based on Node Correlation , 2018 .
[33] Lu Liu,et al. An authenticated asymmetric group key agreement based on attribute encryption , 2018, J. Netw. Comput. Appl..
[34] Chen Liang,et al. RootAgency: A digital signature-based root privilege management agency for cloud terminal devices , 2018, Inf. Sci..
[35] Giovanni Vigna,et al. Using Hidden Markov Models to Evaluate the Risks of Intrusions , 2006, RAID.
[36] Yongcheng Li,et al. Analysis of Network Vulnerability Under Joint Node and Link Attacks , 2018 .
[37] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..