Network security assessment based on node correlated HMM

被引:0
|
作者
Long, Men [1 ]
Xia, Jing-Bo [1 ]
Zhang, Zi-Yang [2 ]
Guo, Rong-Xiao [1 ]
机构
[1] Telecommunication Engineering College, Air Force Engineering University, Xi'an 710077, China
[2] Engineering College, Air Force Engineering University, Xi'an 710038, China
来源
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications | 2010年 / 33卷 / 06期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:121 / 124
相关论文
共 50 条
  • [41] Study on Network Security Assessment Based on Analytical Hierarchy Process
    Qian Dong-mei
    Fan Chun-shu
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 2320 - 2323
  • [42] Dynamic voltage security assessment by a neural network based method
    Amjady, N
    ELECTRIC POWER SYSTEMS RESEARCH, 2003, 66 (03) : 215 - 226
  • [43] Network security risk assessment studies based on the game theory
    Xu, Yan-Li
    Wang, Ling-Ling
    Liu, Jing
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2011, 32 (SUPPL.1): : 200 - 203
  • [44] A network security situation assessment method based on fusion model
    Yunhao Yu
    Discover Applied Sciences, 6
  • [45] Danger Theory Based Model for Network Security Risk Assessment
    Sun, Feixian
    SPORTS MATERIALS, MODELLING AND SIMULATION, 2011, 187 : 148 - 154
  • [46] A network security situation assessment method based on fusion model
    Yu, Yunhao
    DISCOVER APPLIED SCIENCES, 2024, 6 (03)
  • [47] An Algorithm for Network Security Situation Assessment Based on Deep Learning
    Wen, Zhicheng
    Peng, Linhua
    Wan, Weiqing
    Ou, Jing
    INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2023, 37 (02)
  • [48] Study on Risk Assessment of Network Security Based on Game Theory
    Xu Yanli
    Wang Lingling
    ADVANCED MATERIALS SCIENCE AND TECHNOLOGY, PTS 1-2, 2011, 181-182 : 799 - +
  • [49] Quantitative assessment for network security situation based on weighted factors
    Wen, Zhicheng
    Tang, Jun
    JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2016, 16 (04) : 821 - 833
  • [50] A Network Security Risk Assessment Method based on Immunity Algorithm
    Yuan Hao
    PROGRESS IN MEASUREMENT AND TESTING, PTS 1 AND 2, 2010, 108-111 : 948 - 953