Situation awareness refers to collect, process, and extract a variety of factors which can affect network situation awareness in the network environments, then build index system, establish evaluation model to assess the current network security situation awareness index and predict the future trend from the macro. Based on studying the predecessors' research works, the article regard the security events and network node resource information as the source of extracting index and construct a tree index system, combining with this system, it proposes a hierarchical network security situation assessment model, used fuzzy analytic hierarchy process (FAHP) to solve the problem of weight calculation among the model, designed Index ...
Network security situation assessment can project the next behavior of the network by describing the...
Abstract. Proposed is an algorithm for network security situation prediction (NSSP) based on adaptiv...
Due to the rise of Cyber crime it is important to explore the Cyber security area. The threats are r...
Abstract. In order to solve the problem of methodology subjectivity, long modeling time and low clas...
With the increasing importance of network security, more attention is paid to the research on networ...
In order to reflect the situation of network security assessment performance fully and accurately, a...
AbstractAs the security situational assessment widely applying to the computer network field, schola...
AbstractNetwork Security Situation Awareness (NSSA) technology has been extensively studied in multi...
General Secretary XI Jinping gave instructions at the symposium on cybersecurity and informatization...
In today’s increasingly severe network security situation, network security situational awareness pr...
his paper presents an empirical framework for implementing Situation Awareness Measurement Technique...
deployment model Abstract. In order to help network managers better grasp the situation of network s...
To better understand the behavior of attackers and describe the network state, we construct an LSTM-...
There are a lot of uncertainties in the network security situation assessment that depends on is mul...
Abstract With the rapid development of the Internet, network security situation awareness has attrac...
Network security situation assessment can project the next behavior of the network by describing the...
Abstract. Proposed is an algorithm for network security situation prediction (NSSP) based on adaptiv...
Due to the rise of Cyber crime it is important to explore the Cyber security area. The threats are r...
Abstract. In order to solve the problem of methodology subjectivity, long modeling time and low clas...
With the increasing importance of network security, more attention is paid to the research on networ...
In order to reflect the situation of network security assessment performance fully and accurately, a...
AbstractAs the security situational assessment widely applying to the computer network field, schola...
AbstractNetwork Security Situation Awareness (NSSA) technology has been extensively studied in multi...
General Secretary XI Jinping gave instructions at the symposium on cybersecurity and informatization...
In today’s increasingly severe network security situation, network security situational awareness pr...
his paper presents an empirical framework for implementing Situation Awareness Measurement Technique...
deployment model Abstract. In order to help network managers better grasp the situation of network s...
To better understand the behavior of attackers and describe the network state, we construct an LSTM-...
There are a lot of uncertainties in the network security situation assessment that depends on is mul...
Abstract With the rapid development of the Internet, network security situation awareness has attrac...
Network security situation assessment can project the next behavior of the network by describing the...
Abstract. Proposed is an algorithm for network security situation prediction (NSSP) based on adaptiv...
Due to the rise of Cyber crime it is important to explore the Cyber security area. The threats are r...