To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each vulnerable component is modeled by Stochastic Petri net and two parameters, Successfully Attack Probability (SAP) and Vulnerability Volume of each component to another component. The second parameter, as a second dimension of security evaluation, is a metric that is added to modeling to improve the accuracy of the result of system security prediction...
Security is a topic of ever increasing interest. Today it is widely accepted that, due to the unavoi...
Modeling of system and information security aims to facilitate formal representation and analysis of...
Abstract. Aim Currently, the implementation of computational experiments to determine the probabilis...
This study proposes a stochastic Petri net model for evaluating the security and resilience of cyber...
Several multi-disciplinary aspects need to be addressed in security risk evaluation, including the e...
According to some experts, organizations make investments of huge sum of dollars concerning firewall...
Development of Cybersecurity processes and strategies should take two main approaches. One is to dev...
Reliability is an important software quality parameter. In this research for computation of software...
Software protection is an essential aspect of information security to withstand malicious activities...
Software Defined Networking (SDN) realizes network orchestration by separating the centralized netwo...
This thesis estimates the performance of software system using Stochastic Petri Nets (SPN) and Fault...
This paper develops an analytic technique for quanti-fying the risk of computer network operations (...
Information security incidents frequency has been increasing dramatically, the aim of this study is ...
Protection schemes are modelled through Petri Nets, in order to carry out performance evaluation. Ma...
The paper presents a tool for verifying, during the system security design, security properties of d...
Security is a topic of ever increasing interest. Today it is widely accepted that, due to the unavoi...
Modeling of system and information security aims to facilitate formal representation and analysis of...
Abstract. Aim Currently, the implementation of computational experiments to determine the probabilis...
This study proposes a stochastic Petri net model for evaluating the security and resilience of cyber...
Several multi-disciplinary aspects need to be addressed in security risk evaluation, including the e...
According to some experts, organizations make investments of huge sum of dollars concerning firewall...
Development of Cybersecurity processes and strategies should take two main approaches. One is to dev...
Reliability is an important software quality parameter. In this research for computation of software...
Software protection is an essential aspect of information security to withstand malicious activities...
Software Defined Networking (SDN) realizes network orchestration by separating the centralized netwo...
This thesis estimates the performance of software system using Stochastic Petri Nets (SPN) and Fault...
This paper develops an analytic technique for quanti-fying the risk of computer network operations (...
Information security incidents frequency has been increasing dramatically, the aim of this study is ...
Protection schemes are modelled through Petri Nets, in order to carry out performance evaluation. Ma...
The paper presents a tool for verifying, during the system security design, security properties of d...
Security is a topic of ever increasing interest. Today it is widely accepted that, due to the unavoi...
Modeling of system and information security aims to facilitate formal representation and analysis of...
Abstract. Aim Currently, the implementation of computational experiments to determine the probabilis...