© 2016 IEEE. The risk assessment of any Network or Security systems has a high level of uncertainties because usually probability and statistics were used to evaluate the security of different cyber security systems. In this paper we will use Shannon entropy to represent the uncertainty of information used to calculate systems risk and entropy weight method since the weight of the object index is normally used and point to the significant components of the index. We evaluate the risk of security systems in terms of different security layers and protections. The information system is analysed by perimeter, network, host, application and data layers' protections. The capability of protections is measured by introducing the concept of protecti...
Computing systems and mobile technologies have changed dramatically since the introduction of firewa...
After being introduced by Shannon as a measure of disorder and unavailable information, the notion o...
Security assessment is crucial for the reliable and secure operation of power systems. This paper pr...
© 2016 IEEE. The risk assessment of any Network or Security systems has a high level of uncertaintie...
Nowadays, computer networks are playing a more and more important role in people’s daily lives. Mean...
In traditional risk evaluation, the weight of a risk index is given in advance, so it lacks objectiv...
Risk is the major reason for the failure of software development projects. The risk measurement can ...
1Abstract—In this paper, we propose analysis methods based on security entropy to overcome the probl...
This paper deals with problems of the development and security of distributed information systems. I...
Abstract: To solve the following problems of information security risk assessment method: inconsiste...
Nowadays, security risk assessment has become an integral part of network security as everyday life ...
In the process of risk assessment of information system, the risk assessment method and model are th...
A method based on improved fuzzy theory of evidence was presented to solve the problem that there ex...
An organization that works with any information must have a security system capable of protecting th...
Quantitative security risk evaluation of information systems is increasingly drawing more and more a...
Computing systems and mobile technologies have changed dramatically since the introduction of firewa...
After being introduced by Shannon as a measure of disorder and unavailable information, the notion o...
Security assessment is crucial for the reliable and secure operation of power systems. This paper pr...
© 2016 IEEE. The risk assessment of any Network or Security systems has a high level of uncertaintie...
Nowadays, computer networks are playing a more and more important role in people’s daily lives. Mean...
In traditional risk evaluation, the weight of a risk index is given in advance, so it lacks objectiv...
Risk is the major reason for the failure of software development projects. The risk measurement can ...
1Abstract—In this paper, we propose analysis methods based on security entropy to overcome the probl...
This paper deals with problems of the development and security of distributed information systems. I...
Abstract: To solve the following problems of information security risk assessment method: inconsiste...
Nowadays, security risk assessment has become an integral part of network security as everyday life ...
In the process of risk assessment of information system, the risk assessment method and model are th...
A method based on improved fuzzy theory of evidence was presented to solve the problem that there ex...
An organization that works with any information must have a security system capable of protecting th...
Quantitative security risk evaluation of information systems is increasingly drawing more and more a...
Computing systems and mobile technologies have changed dramatically since the introduction of firewa...
After being introduced by Shannon as a measure of disorder and unavailable information, the notion o...
Security assessment is crucial for the reliable and secure operation of power systems. This paper pr...