A similarity-based M(1, 2, 3) approach for rating the security of network systems.
Junhu RuanYan ShiTakashi SamatsuPublished in: SCIS&ISIS (2014)
Keyphrases
- security measures
- intrusion prevention
- single point of failure
- network services
- cyber attacks
- intrusion detection
- enterprise network
- critical infrastructure
- access control
- security systems
- network management
- network model
- computer networks
- management system
- application level
- information assurance
- network resources
- key management
- cyber security
- statistical databases
- security policies
- security threats
- intrusion detection system
- complex systems