Research on Railway Network Data Security Risk Assessment Method Based on Attack and Defense Resource Allocation
Abstract
References
Index Terms
- Research on Railway Network Data Security Risk Assessment Method Based on Attack and Defense Resource Allocation
Recommendations
Cybersecurity risk assessment method of ICS based on attack-defense tree model
Cybersecurity risk assessment is an important means of effective response to network attacks on industrial control systems. However, cybersecurity risk assessment process is susceptible to subjective and objective effects. To solve this problem, this ...
A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment
CSSE '08: Proceedings of the 2008 International Conference on Computer Science and Software Engineering - Volume 06How to quantify the threat probability in network security risk assessment is an important problem to be solved. Most of the existing methods tend to consider the attacker and defender separately. However, the decision to perform the attack is a trade-...
Research on Network Risk Assessment Based on Attack Probability
IWCSE '09: Proceedings of the 2009 Second International Workshop on Computer Science and Engineering - Volume 02A quantitative risk evaluation method for network security is proposed based on analyzing the process that attackers intrude network. The analysis depends on modeling attack activities and attack processes by tracking the transferring of safety states. ...
Comments
Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 19Total Downloads
- Downloads (Last 12 months)19
- Downloads (Last 6 weeks)10
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format