2004
DOI: 10.1007/978-3-540-24707-4_24
|View full text |Cite
|
Sign up to set email alerts
|

The Vulnerability Assessment for Active Networks; Model, Policy, Procedures, and Performance Evaluations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2009
2009
2014
2014

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Han, Yang and Chang described an expansible vulnerability model in order to qualitatively assess the security of an active network aiming at solving a problem that it is more suited for an active network, than a traditional one [27]. Eom, Park and Han introduced a risk assessment method based on asset valuation and quantification [19].…”
Section: Overview Of Risk Assessment Methodologiesmentioning
confidence: 99%
“…Han, Yang and Chang described an expansible vulnerability model in order to qualitatively assess the security of an active network aiming at solving a problem that it is more suited for an active network, than a traditional one [27]. Eom, Park and Han introduced a risk assessment method based on asset valuation and quantification [19].…”
Section: Overview Of Risk Assessment Methodologiesmentioning
confidence: 99%
“…These techniques provide a representation of system operations and undesirable events, and a validation of the system safety level (Craft et al, 1998;Modarres et al, 1999;Bowles and Wan, 2001;Stathiakis et al, 2003;Cervesato and Meadows, 2003). Han et al (2004) described an expansible vulnerability model in order to qualitatively assess the security of an active network and active nodes, aiming at solving a problem that is more suited for an active network than a traditional one. Eom et al (2007) introduced a risk assessment method based on asset valuation and quantification.…”
Section: Related Workmentioning
confidence: 99%