Risk Assessment Method of IoT Host Based on Attack Graph

被引:0
|
作者
Yang, Hongyu [1 ,2 ]
Yuan, Haihang [2 ]
Zhang, Liang [3 ]
机构
[1] School of Safety Science and Engineering, Civil Aviation University of China, Tianjin,300300, China
[2] School of Computer Science and Technology, Civil Aviation University of China, Tianjin,300300, China
[3] School of Information, The University of Arizona, Tucson,AZ,85721, United States
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Internet of things - Topology
引用
收藏
相关论文
共 50 条
  • [21] Multi-agent network security risk assessment research based on attack graph
    Xie, Lixia
    Qiu, Xiaorui
    Zhao, Binbin
    ICIC Express Letters, Part B: Applications, 2015, 6 (10): : 2809 - 2816
  • [22] Dynamic logic-based attack graph for risk assessment in complex computer systems
    Boudermine, Antoine
    Khatoun, Rida
    Choyer, Jean-Henri
    COMPUTER NETWORKS, 2023, 228
  • [23] A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow
    Wang, Huan
    Chen, Zhanfang
    Zhao, Jianping
    Di, Xiaoqiang
    Liu, Dan
    IEEE ACCESS, 2018, 6 : 8599 - 8609
  • [24] Multiobjective network security dynamic assessment method based on Bayesian network attack graph
    Xie, Jialiang
    Zhang, Shanli
    Wang, Honghui
    Chen, Mingzhi
    INTERNATIONAL JOURNAL OF INTELLIGENT COMPUTING AND CYBERNETICS, 2024, 17 (01) : 38 - 60
  • [25] A passenger risk assessment method based on 5G-IoT
    Chen, Weishi
    Huang, Yifeng
    Yang, Hao
    Li, Jing
    Lu, Xianfeng
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
  • [26] A passenger risk assessment method based on 5G-IoT
    Weishi Chen
    Yifeng Huang
    Hao Yang
    Jing Li
    Xianfeng Lu
    EURASIP Journal on Wireless Communications and Networking, 2021
  • [27] A method of classifying IoT devices based on attack sensitivity
    Wang, Huifen
    Guo, Dong
    Wei, Jinrui
    Li, Jinze
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 82
  • [28] Attack Graph based Network Risk Assessment: Exact Inference vs Region-based Approximation
    Cheng, Qi
    Kwiat, Kevin
    Kamhoua, Charles A.
    Njilla, Laurent
    2017 IEEE 18TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE 2017), 2017, : 84 - 87
  • [29] Heuristic Network Security Risk Based on Attack Graph
    Sun, Wei
    Li, Qianmu
    Wang, Pengchuan
    Hou, Jun
    CLOUD COMPUTING, CLOUDCOMP 2021, 2022, 430 : 181 - 194
  • [30] A new method for vulnerability and risk assessment of IoT
    Arat, Ferhat
    Akleylek, Sedat
    COMPUTER NETWORKS, 2023, 237