2019
DOI: 10.1016/j.cose.2019.06.016
|View full text |Cite
|
Sign up to set email alerts
|

MDC-Checker: A novel network risk assessment framework for multiple domain configurations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(11 citation statements)
references
References 7 publications
0
11
0
Order By: Relevance
“…There are four kinds of basic information to be extracted, namely Entity, Relationship, Protection, and Privilege Dependency Rule. There are seven kinds of entities, 13 kinds of relationships, three kinds of protections and 14 standard privilege dependency rules, which are listed in detail in the paper [7]. This basic information describes various details of the target network in a formal way.…”
Section: The Fast-uapr Framework Overviewmentioning
confidence: 99%
“…There are four kinds of basic information to be extracted, namely Entity, Relationship, Protection, and Privilege Dependency Rule. There are seven kinds of entities, 13 kinds of relationships, three kinds of protections and 14 standard privilege dependency rules, which are listed in detail in the paper [7]. This basic information describes various details of the target network in a formal way.…”
Section: The Fast-uapr Framework Overviewmentioning
confidence: 99%
“…To address this challenge, we propose a unified semantic information description method based on KG in multiple domain cyberspace. In reference [16], cyberspace should be integrated into physical domain, information domain, network domain, social domain and other domains, so it can be seen that cyberspace has the characteristics of multiple regions.…”
Section: Unified Description Of Multiple Domain Cyberspace Semantic I...mentioning
confidence: 99%
“…The node with the highest score is the entity node that can be reasoning. Method B: Reasoning method Based on Rules (BOR) [16]. Since there is no public permissions reasoning data sets in the previous research, we adopt the rule-based reasoning method based on [16] to conduct user permissions reasoning for the training data sets and obtain the permissions that they can finally obtain.…”
Section: Baselinesmentioning
confidence: 99%
See 2 more Smart Citations