2014
DOI: 10.1016/j.comcom.2014.06.009
|View full text |Cite
|
Sign up to set email alerts
|

Mean privacy: A metric for security of computer systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…Attack trees can also be used in security hardening to determine the best options to increase security within a budget [29]. Using attack trees can help to understand what kind of attackers may follow an attack path [9,30,31]. Attack graphs can be automatically generated by modeling the network and vulnerabilities, and many useful analyses may be performed using attack graphs [10,32,33].…”
Section: Related Workmentioning
confidence: 99%
“…Attack trees can also be used in security hardening to determine the best options to increase security within a budget [29]. Using attack trees can help to understand what kind of attackers may follow an attack path [9,30,31]. Attack graphs can be automatically generated by modeling the network and vulnerabilities, and many useful analyses may be performed using attack graphs [10,32,33].…”
Section: Related Workmentioning
confidence: 99%
“…Jamar and Almasizadeh [10] introduced the mean privacy approach to intuitively quantify how attackers behave and their predictability. This metric can be considered an appropriate indicator for quantifying the security level of computer systems, which was quantified by an information theoretic.…”
Section: Related Workmentioning
confidence: 99%
“…where T 1 (D m , D n ) represents the direct trust degree from D m to D n according to formula (10), level is the level of the feedback trust. For example in Fig.…”
Section: ) Weight Calculationmentioning
confidence: 99%