Network Security Risk Assessment Based on Enterprise Environment Characteristics

被引:0
|
作者
Yang, Yunxue [1 ]
Yang, Zhenqi [2 ]
Yang, Qin [1 ]
Ji, Guohua [1 ]
Xue, Shengjun [1 ]
机构
[1] Department of Computer Science and Technology, Silicon Lake College, 168 Greenland Avenue, Huaqiao International Business Zone, Kunshan, Jiangsu, China
[2] Binjiang College of Nanjing University of Information Science & Technology, China 333 Xishan Avenue, Wuxi, Jiangsu, China
关键词
Compilation and indexing terms; Copyright 2025 Elsevier Inc;
D O I
10.6633/IJNS.20220124(1).18
中图分类号
学科分类号
摘要
Risk assessment - Bayesian networks - Inference engines - Losses
引用
收藏
页码:156 / 165
相关论文
共 50 条
  • [1] A risk assessment model for enterprise network security
    Yang, Fu-Hong
    Chi, Chi-Hung
    Liu, Lin
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 293 - 301
  • [2] Enterprise Information Security Risk and Countermeasure Research under Network Environment
    Zhu Guohua
    2015 SEVENTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2015), 2015, : 453 - 456
  • [3] Risk Assessment of Network Security Based on Non-Optimum Characteristics Analysis
    He, Ping
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (10) : 73 - 79
  • [4] Model-based risk assessment to improve enterprise security
    Aagedal, JO
    den Braber, F
    Dimitrakos, T
    Gran, BA
    Raptis, D
    Stolen, K
    SIXTH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2002, : 51 - 62
  • [5] Detection, Mitigation and Quantitative Security Risk Assessment of Invisible Attacks at Enterprise Network
    Munir, Rashid
    Mufti, Muhammad Rafiq
    Awan, Irfan
    Hu, Yim Fun
    Disso, Jules Pagna
    2015 3RD INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD) AND INTERNATIONAL CONFERENCE ON OPEN AND BIG (OBD), 2015, : 256 - 263
  • [6] A Security Risk Assessment Framework for the Enterprise Intranet
    Lou, Fang
    Tian, Zhi-hong
    Fu, Yun-sheng
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND AUTOMATION (ICEEA 2016), 2016,
  • [7] Network Security Risk Assessment Based on Node Correlation
    Wang, Zengguang
    Lu, Yu
    Li, Jindong
    3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
  • [8] Network Security Risk Assessment Based on Association Rules
    Cheng, Xiaorong
    Wei, Yan
    Geng, Xin
    ICCSSE 2009: PROCEEDINGS OF 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2009, : 1142 - 1145
  • [9] Network Security Risk Assessment Based on Attack Graph
    Xie, Lixia
    Zhang, Xiao
    Zhang, Jiyong
    JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347
  • [10] Considering Temporal and Environmental Characteristics of Vulnerabilities in Network Security Risk Assessment
    Khosravi-Farmad, Masoud
    Rezaee, Razieh
    Bafghi, Abbas Ghaemi
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 186 - 191