Mathematical model construction of communication security assessment method based on TST switching network matrix

2021 ◽  
Vol 14 (2) ◽  
pp. 93
Author(s):  
Jingbo Hu
2018 ◽  
Vol 12 (1) ◽  
Author(s):  
Robert W. Smith ◽  
Rik P. van Rosmalen ◽  
Vitor A. P. Martins dos Santos ◽  
Christian Fleck

2010 ◽  
Vol 108-111 ◽  
pp. 948-953 ◽  
Author(s):  
Hao Yuan

Based on the research of domestic and foreign vulnerability assessment systems, in this paper, we propose an improved network security assessment method based on Immunity algorithm. It integrates the advantages of both host based and network based scan system. Our goal is to explore the known security vulnerabilities, and to check hosts’ security effectively as well. It has the features of self-adaptive, distributed, and real time. Therefore, it provides a good solution to risk assessment for network security.


2016 ◽  
Vol 9 (1) ◽  
pp. 40-42 ◽  
Author(s):  
Никитин ◽  
A. Nikitin ◽  
Дровникова ◽  
I. Drovnikova ◽  
Рогозин ◽  
...  

Presents algorithms for calculating the quantitative criterion of security of the automated systems (AS) and the effectiveness of the systems of information protection from unauthorized access (GIS LMI) in these systems, implement early times-robotany mathematical model of identification and evaluation of quantitative criteria the AS security based on the requirements of GOST R ISO/IEC 15408-2-2013. Developed by algorithms are an integral part of the system is automatically bundled design (CAD) GIS LMI AC.


Measurement ◽  
2021 ◽  
pp. 110059
Author(s):  
J. Tarnawski ◽  
K. Buszman ◽  
M. Woloszyn ◽  
T.A. Rutkowski ◽  
A. Cichocki ◽  
...  

2013 ◽  
Vol 7 (3) ◽  
pp. 288-297 ◽  
Author(s):  
Sijie J. Chen ◽  
Chongqing Q. Kang ◽  
Qing Xia ◽  
Qixin X. Chen

Sign in / Sign up

Export Citation Format

Share Document