期刊文献+
共找到1,097篇文章
< 1 2 55 >
每页显示 20 50 100
Fuzzy Risk Assessment Method for Airborne Network Security Based on AHP-TOPSIS
1
作者 KenianWang YuanHong Chunxiao Li 《Computers, Materials & Continua》 SCIE EI 2024年第7期1123-1142,共20页
With the exponential increase in information security risks,ensuring the safety of aircraft heavily relies on the accurate performance of risk assessment.However,experts possess a limited understanding of fundamental ... With the exponential increase in information security risks,ensuring the safety of aircraft heavily relies on the accurate performance of risk assessment.However,experts possess a limited understanding of fundamental security elements,such as assets,threats,and vulnerabilities,due to the confidentiality of airborne networks,resulting in cognitive uncertainty.Therefore,the Pythagorean fuzzy Analytic Hierarchy Process(AHP)Technique for Order Preference by Similarity to an Ideal Solution(TOPSIS)is proposed to address the expert cognitive uncertainty during information security risk assessment for airborne networks.First,Pythagorean fuzzy AHP is employed to construct an index system and quantify the pairwise comparison matrix for determining the index weights,which is used to solve the expert cognitive uncertainty in the process of evaluating the index system weight of airborne networks.Second,Pythagorean fuzzy the TOPSIS to an Ideal Solution is utilized to assess the risk prioritization of airborne networks using the Pythagorean fuzzy weighted distance measure,which is used to address the cognitive uncertainty in the evaluation process of various indicators in airborne network threat scenarios.Finally,a comparative analysis was conducted.The proposed method demonstrated the highest Kendall coordination coefficient of 0.952.This finding indicates superior consistency and confirms the efficacy of the method in addressing expert cognition during information security risk assessment for airborne networks. 展开更多
关键词 Airborne networks information security risk assessment cognitive uncertainty Pythagorean fuzzy sets
下载PDF
A Fuzzy Set-Based Approach for Model-Based Internet-Banking System Security Risk Assessment 被引量:3
2
作者 LI Hetian LIU Yun HE Dequan 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1869-1872,共4页
A fuzzy set-based evaluation approach is demonstrated to assess the security risks for internet-banking System. The Internet-banking system is semi-formally described using Unified Modeling Language (UML) to specify... A fuzzy set-based evaluation approach is demonstrated to assess the security risks for internet-banking System. The Internet-banking system is semi-formally described using Unified Modeling Language (UML) to specify the behavior and state of the system on the base of analyzing the existing qualitative risk assessment methods. And a quantitative method based on fuzzy set is used to measure security risks of the system, A case study was performed on the WEB server of the Internet-banking System using fuzzy-set based assessment algorithm to quantitatively compute the security risk severity. The numeric result also provides a method to decide the most critical component which should amuse the system administrator enough attention to take the appropriate security measure or controls to alleviate the risk severity. The experiments show this method can be used to quantify the security properties for the Internet-banking System in practice. 展开更多
关键词 risk assessment system security fuzzy set unified modeling language
下载PDF
Security Risk Assessment of Cyber Physical Power System Based on Rough Set and Gene Expression Programming 被引量:3
3
作者 Song Deng Dong Yue +1 位作者 Xiong Fu Aihua Zhou 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2015年第4期431-439,共9页
Risk assessment is essential for the safe and reliable operation of cyber physical power system. Traditional security risk assessment methods do not take integration of cyber system and physical system of power grid i... Risk assessment is essential for the safe and reliable operation of cyber physical power system. Traditional security risk assessment methods do not take integration of cyber system and physical system of power grid into account. In order to solve this problem, security risk assessment algorithm of cyber physical power system based on rough set and gene expression programming is proposed. Firstly, fast attribution reduction based on binary search algorithm is presented. Secondly, security risk assessment function for cyber physical power system is mined based on gene expression programming. Lastly, security risk levels of cyber physical power system are predicted and analyzed by the above function model. Experimental results show that security risk assessment function model based on the proposed algorithm has high efficiency of function mining, accuracy of security risk level prediction and strong practicality. 展开更多
关键词 Gene expression programming function mining security risk assessment cyber physical power system
下载PDF
Risk assessment of water security in Haihe River Basin during drought periods based on D-S evidence theory 被引量:6
4
作者 Qian-jin DONG Xia LIU 《Water Science and Engineering》 EI CAS CSCD 2014年第2期119-132,共14页
The weights of the drought risk index (DRI), which linearly combines the reliability, resiliency, and vulnerability, are difficult to obtain due to complexities in water security during drought periods. Therefore, d... The weights of the drought risk index (DRI), which linearly combines the reliability, resiliency, and vulnerability, are difficult to obtain due to complexities in water security during drought periods. Therefore, drought entropy was used to determine the weights of the three critical indices. Conventional simulation results regarding the risk load of water security during drought periods were often regarded as precise. However, neither the simulation process nor the DRI gives any consideration to uncertainties in drought events. Therefore, the Dempster-Shafer (D-S) evidence theory and the evidential reasoning algorithm were introduced, and the DRI values were calculated with consideration of uncertainties of the three indices. The drought entropy and evidential reasoning algorithm were used in a case study of the Haihe River Basin to assess water security risks during drought periods. The results of the new DRI values in two scenarios were compared and analyzed. It is shown that the values of the DRI in the D-S evidence algorithm increase slightly from the original results of Zhang et al. (2005), and the results of risk assessment of water security during drought periods are reasonable according to the situation in the study area. This study can serve as a reference for further practical application and planning in the Haihe River Basin, and other relevant or similar studies. 展开更多
关键词 risk assessment water security drought periods entropy D-S evidence theory "evidential reasoning algorithm Haihe River Basin
下载PDF
Resource Allocation for Network Security Risk Assessment:A Non-Cooperative Differential Game Based Approach 被引量:1
5
作者 XU Haitao LIN Ruijie 《China Communications》 SCIE CSCD 2016年第4期131-135,共5页
In this paper, we propose a non-cooperative differential game theory based resource allocation approach for the network security risk assessment. For the risk assessment, the resource will be used for risk assess, inc... In this paper, we propose a non-cooperative differential game theory based resource allocation approach for the network security risk assessment. For the risk assessment, the resource will be used for risk assess, including response cost and response negative cost. The whole assessment process is considered as a differential game for optimal resource control. The proposed scheme can be obtained through the Nash Equilibrium. It is proved that the game theory based algorithm is applicable and the optimal resource level can be achieved based on the proposed algorithm. 展开更多
关键词 resource allocation security risk assessment differential game NON-COOPERATIVE Nash Equilibrium
下载PDF
A Website Security Risk Assessment Method Based on the I-BAG Model
6
作者 Lin Liu Liang Liu +2 位作者 Cheng Huang Zhao Zhang Yong Fang 《China Communications》 SCIE CSCD 2016年第5期172-181,共10页
In order to protect the website and assess the security risk of website, a novel website security risk assessment method is proposed based on the improved Bayesian attack graph(I-BAG) model. First, the Improved Bayesi... In order to protect the website and assess the security risk of website, a novel website security risk assessment method is proposed based on the improved Bayesian attack graph(I-BAG) model. First, the Improved Bayesian attack graph model is established, which takes attack benefits and threat factors into consideration. Compared with the existing attack graph models, it can better describe the website's security risk. Then, the improved Bayesian attack graph is constructed with optimized website attack graph, attack benefit nodes, threat factor nodes and the local conditional probability distribution of each node, which is calculated accordingly. Finally, website's attack probability and risk value are calculated on the level of nodes, hosts and the whole website separately. The experimental results demonstrate that the risk evaluating method based on I-BAG model proposed is a effective way for assessing the website security risk. 展开更多
关键词 风险评估方法 网站安全 图模型 安全风险评估 攻击概率 威胁因素 贝叶斯 概率分布
下载PDF
An Analysis of Formal Risk Assessments for Safety and Security in Ports: Empirical Evidence from Container Terminals in Greece
7
作者 Constantinos I. Chlomoudis Petros A. Kostagiolas Petros L. Pallis 《Journal of Shipping and Ocean Engineering》 2012年第1期45-54,共10页
关键词 风险评估方法 集装箱码头 港口安全 希腊 成本效益 主管部门 货柜码头 半结构化
下载PDF
Research about Online Security Warning and Risk Assessment of Power Grid Based on Energy Management System
8
作者 Hanyun Wang Kangyuan Wang +2 位作者 Yunxiao Zhang Guoqiang Mei Mingming Wu 《Journal of Energy and Power Engineering》 2012年第3期485-487,共3页
关键词 能量管理系统 网络安全预警 风险评估 电网 能源管理系统 运行状态 风险指数 严重程度
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
9
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information security Network security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation risk assessment Vulnerability Management Incident Response security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling security Architecture
下载PDF
Assessing the Risk Situation of Network Security for Active Defense 被引量:2
10
作者 ZHANG Xiang YAO Shuping TANG Chenghua 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1718-1722,共5页
The risk situation assessment and forecast technique of network security is a basic method of active defense techniques. In order to assess the risk of network security two methods were used to define the index of ris... The risk situation assessment and forecast technique of network security is a basic method of active defense techniques. In order to assess the risk of network security two methods were used to define the index of risk and forecast index in time series, they were analytical hierarchy process (AHP) and support vector regression (SVR). The module framework applied the methods above was also discussed. Experiment results showed the forecast values were so close to actual values and so it proved the approach is correct. 展开更多
关键词 network security risk situation assessment index FORECAST
下载PDF
Research on Assessment Model of Information System Security Based on Various Security Factors 被引量:5
11
作者 林梦泉 朱赟 +1 位作者 王强民 李建华 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第3期405-409,共5页
With the rapid development of network technology, the meaning of layers and attributes in respect of information system security must be extended based on the understanding of the concept of information system securit... With the rapid development of network technology, the meaning of layers and attributes in respect of information system security must be extended based on the understanding of the concept of information system security. The layering model (LM) of information system security and the five-attribute model (FAM) based on security factors were put forward to perfect the description and modeling of the information system security framework. An effective framework system of risk calculation and assessment was proposed, which is based on FAM. 展开更多
关键词 通信保密 信息系统 安全系统 模型
下载PDF
A Study on Quantitative Methodology to Assess Cyber Security Risk of Smart Grid
12
作者 Pil Sung Woo Byung-Hyun Ko +1 位作者 Dong-Joo Kang Balho H. Kim 《Energy and Power Engineering》 2013年第4期1312-1316,共5页
This paper aims to identify and clarify the cyber security risks and their interaction with the power system in Smart Grid. The SCADA system and other communication networks interact with the power system on a real ti... This paper aims to identify and clarify the cyber security risks and their interaction with the power system in Smart Grid. The SCADA system and other communication networks interact with the power system on a real time basis, so it is important to understand the interaction between two layers to protect the power system from potential cyber threats. This paper has shown the risks of the open architecture SCADA in a quantitative method and proposed effective security measures through case studies. 展开更多
关键词 SMART GRID CYBER security Open Architecture SCADA Power System VULNERABILITY risk assessment
下载PDF
Dependence-Induced Risk: Security Metrics and Their Measurement Framework 被引量:2
13
作者 Liqiang Zhang Fei Yan +1 位作者 Bo Zhao Shouhuai Xu 《China Communications》 SCIE CSCD 2016年第11期119-128,共10页
Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are in... Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are inherent to the dependence structure in software with vulnerabilities and exhibit a "cascading" effect. We present a measurement framework for evaluating these metrics,and report a preliminary case study on evaluating the dependence-induced security risks in the Apache HTTP Server. The experiment results show that our framework can not only clearly analyze the root cause of the security risks but also quantitatively evaluate the attack consequence of the risks. 展开更多
关键词 安全风险评价 安全度量 框架 诱导 HTTP服务器 APACHE 定量评估 网络空间
下载PDF
A New Risk Assessment Approach for Cloud Consumer
14
作者 Saadia Drissi Hicham Medromi 《通讯和计算机(中英文版)》 2014年第1期52-58,共7页
关键词 风险评估方法 消费者 安全风险评估 评估工具 计算 供应商 提供商 安全性
下载PDF
Development and Application of On-line Wind Power Risk Assessment System
15
作者 Su, Feng Zhou, Xiaoxin +3 位作者 Yu, Haiguo Xian, Wenjun Lü, Ying Ren, Lingyu 《电力系统自动化》 EI CSCD 北大核心 2012年第8期161-165,共5页
Because of the large-scale integration of wind power,the dynamic characteristics of power system have many uncertain effects.Based on deterministic analysis methods,traditional on-line security assessment system canno... Because of the large-scale integration of wind power,the dynamic characteristics of power system have many uncertain effects.Based on deterministic analysis methods,traditional on-line security assessment system cannot quantitatively estimate the actual operating conditions of the power system for only considering the most serious and credible accidents.Therefore,the risk theory is introduced into an on-line security assessment system and then an on-line risk assessment system for wind power is designed and implemented by combining with the dynamic security assessment system.Based on multiple data integration,the wind power disturbance probability is available and the security assessment of the power grid can obtain security indices in different aspects.The operating risk index is an expectation of severity,computed by summing up all the products of the result probability and its severity.Analysis results are reported to the dispatchers in on-line environment,while the comprehensive weak links are automatically provided to the power dispatching center.The risk assessment system in operation can verify the reasonableness of the system. 展开更多
关键词 安全评估系统 风力发电系统 风险理论 应用 开发 定性分析方法 动态安全评估 电力调度中心
下载PDF
Research on the Essential Network Equipment Risk Assessment Methodology based on Vulnerability Scanning Technology
16
作者 Xiaoqin Song 《International Journal of Technology Management》 2015年第10期50-52,共3页
关键词 风险评估方法 漏洞扫描技术 网络设备 计算机 攻击者 入侵 黑客 信息
下载PDF
Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals
17
作者 Antonio SANTOS-OLMO Luis Enrique SÁNCHEZ +4 位作者 David G.ROSADO Manuel A.SERRANO Carlos BLANCO Haralambos MOURATIDIS Eduardo FERNÁNDEZ-MEDINA 《Frontiers of Computer Science》 SCIE EI CSCD 2024年第3期199-216,共18页
The information society depends increasingly on risk assessment and management systems as means to adequately protect its key information assets.The availability of these systems is now vital for the protection and ev... The information society depends increasingly on risk assessment and management systems as means to adequately protect its key information assets.The availability of these systems is now vital for the protection and evolution of companies.However,several factors have led to an increasing need for more accurate risk analysis approaches.These are:the speed at which technologies evolve,their global impact and the growing requirement for companies to collaborate.Risk analysis processes must consequently adapt to these new circumstances and new technological paradigms.The objective of this paper is,therefore,to present the results of an exhaustive analysis of the techniques and methods offered by the scientific community with the aim of identifying their main weaknesses and providing a new risk assessment and management process.This analysis was carried out using the systematic review protocol and found that these proposals do not fully meet these new needs.The paper also presents a summary of MARISMA,the risk analysis and management framework designed by our research group.The basis of our framework is the main existing risk standards and proposals,and it seeks to address the weaknesses found in these proposals.MARISMA is in a process of continuous improvement,as is being applied by customers in several European and American countries.It consists of a risk data management module,a methodology for its systematic application and a tool that automates the process. 展开更多
关键词 information security management security system security risk assessment and management
原文传递
HASN:A Hierarchical Attack Surface Network for System Security Analysis 被引量:1
18
作者 Kangyu Huang Lin Yang +2 位作者 Renfang Fu Shengli Zhou Zheng Hong 《China Communications》 SCIE CSCD 2019年第5期137-157,共21页
Attack surfaces, as one of the security models, can help people to analyse the security of systems in cyberspace, such as risk assessment by utilizing various security metrics or providing a cost-effective network har... Attack surfaces, as one of the security models, can help people to analyse the security of systems in cyberspace, such as risk assessment by utilizing various security metrics or providing a cost-effective network hardening solution. Numerous attack surface models have been proposed in the past decade,but they are not appropriate for describing complex systems with heterogeneous components. To address this limitation, we propose to use a two-layer Hierarchical Attack Surface Network(HASN) that models the data interactions and resource distribution of the system in a component-oriented view. First, we formally define the HASN by extending the entry point and exit point framework. Second, in order to assess data input risk and output risk on the HASN, we propose two behaviour models and two simulation-based risk metrics. Last, we conduct experiments for three network systems. Our experimental results show that the proposed approach is applicable and effective. 展开更多
关键词 ATTACK SURFACE security ANALYSIS security model risk assessment
下载PDF
Dynamic security risk assessment and optimization of power transmission system 被引量:7
19
作者 YU YiXin1 & WANG DongTao1,2 1 Key Laboratory of Power System Simulation and Control of Ministry of Education, Tianjin University, Tianjin 300072, China 2 School of Computer & Automation, Hebei Polytechnic University, Tangshan 063009, China 《Science China(Technological Sciences)》 SCIE EI CAS 2008年第6期713-723,共11页
The paper presents a practical dynamic security region (PDSR) based dynamic security risk assessment and optimization model for power transmission system. The cost of comprehensive security control and the influence o... The paper presents a practical dynamic security region (PDSR) based dynamic security risk assessment and optimization model for power transmission system. The cost of comprehensive security control and the influence of uncertainties of power injections are considered in the model of dynamic security risk assessment. The transient stability constraints and uncertainties of power injections can be considered easily by PDSR in form of hyper-box. A method to define and classify contingency set is presented, and a risk control optimization model is given which takes total dynamic insecurity risk as the objective function for a dominant con-tingency set. An optimal solution of dynamic insecurity risk is obtained by opti-mizing preventive and emergency control cost and contingency set decomposition. The effectiveness of this model has been proved by test results on the New Eng-land 10-genarator 39-bus system. 展开更多
关键词 power transmission SYSTEM risk assessment DYNAMIC security PRACTICAL DYNAMIC security region (PDSR) COMPREHENSIVE security control optimization
原文传递
基于组合权重的混凝土梁火灾后的安全评估
20
作者 张玉稳 刘才玮 张鑫迪 《山东建筑大学学报》 2024年第2期122-127,共6页
对火灾后建(构)筑物进行安全风险评估提供系统的评价体系,可为后期加固方案的制定提供参考依据。文章从混凝土梁的材料参数、作用参数和几何参数等方面选取混凝土强度、混凝土表面颜色、最高温度、受火时间、混凝土裂缝和混凝土脱落6个... 对火灾后建(构)筑物进行安全风险评估提供系统的评价体系,可为后期加固方案的制定提供参考依据。文章从混凝土梁的材料参数、作用参数和几何参数等方面选取混凝土强度、混凝土表面颜色、最高温度、受火时间、混凝土裂缝和混凝土脱落6个评价指标,基于组合权重及模糊理论建立了火灾后混凝土梁安全风险评价模型,应用于火灾后某厂房的安全风险评价,并对比分析了规范评价结果。结果表明:运用所建模型评定的损伤等级与规范评定的损伤等级吻合度较高,验证了所建立评价体系的准确性和合理性。 展开更多
关键词 火灾 安全风险评估 组合权重 模糊理论 钢筋混凝土梁
下载PDF
上一页 1 2 55 下一页 到第
使用帮助 返回顶部