2014
DOI: 10.5121/ijnsa.2014.6303
|View full text |Cite
|
Sign up to set email alerts
|

Attack Graph-Based Risk Assessment and Optimisation Approach

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Even though quantum key distribution has been the focus of outer space competitions, individual based targeted hacks can still happen for chained effects on such breaches in distributed shells -as long as the anticipated gain is worth of the adversaries' decision-making. [28] Since raw data deduction is key to the data structures in wearable devices, a deduced-structure construct in such devices' operating systems can effectively prevent the usability in the breached data and can only function with the appropriate associated device(s) and cloud service(s). [29] It means that log file structures are the key security products in the satellite kernel to device shell pacts.…”
Section: Shells In Satellite Applicationsmentioning
confidence: 99%
“…Even though quantum key distribution has been the focus of outer space competitions, individual based targeted hacks can still happen for chained effects on such breaches in distributed shells -as long as the anticipated gain is worth of the adversaries' decision-making. [28] Since raw data deduction is key to the data structures in wearable devices, a deduced-structure construct in such devices' operating systems can effectively prevent the usability in the breached data and can only function with the appropriate associated device(s) and cloud service(s). [29] It means that log file structures are the key security products in the satellite kernel to device shell pacts.…”
Section: Shells In Satellite Applicationsmentioning
confidence: 99%
“…According to [55], relying on CVSS scores for vulnerability remediation is as effective as random selection in effectively mitigating vulnerabilities commonly exploited by attackers.…”
Section: Vulnerability Risk Assessmentmentioning
confidence: 99%