• Login
    View Item 
    •   Home
    • IRAC Institute for Research in Applicable Computing - to April 2016
    • Centre for Research in Distributed Technologies (CREDIT)
    • View Item
    •   Home
    • IRAC Institute for Research in Applicable Computing - to April 2016
    • Centre for Research in Distributed Technologies (CREDIT)
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of UOBREPCommunitiesTitleAuthorsIssue DateSubmit DateSubjectsPublisherJournalDepartmentThis CollectionTitleAuthorsIssue DateSubmit DateSubjectsPublisherJournalDepartment

    My Account

    LoginRegister

    About

    AboutLearning ResourcesResearch Graduate SchoolResearch InstitutesUniversity Website

    Statistics

    Display statistics

    An analytical evaluation of network security modelling techniques applied to manage threats

    • CSV
    • RefMan
    • EndNote
    • BibTex
    • RefWorks
    Authors
    Viduto, Valentina
    Maple, Carsten
    Huang, Wei
    Issue Date
    2010
    Subjects
    attack graph
    attack tree
    network hardening
    threats
    computer security
    
    Metadata
    Show full item record
    Abstract
    The current ubiquity of information coupled with the reliance on such data by businesses has led to a great deal of resources being deployed to ensure the security of this information. Threats can come from a number of sources and the dangers from those insiders closest to the source have increased significantly recently. This paper focuses on techniques used to identify and manage threats as well as the measures that every organisation should consider to put into action. A novel game-based onion skin model has been proposed, combining techniques used in theory-based and hardware-based hardening strategies.
    Citation
    Viduto, V.; Maple, C.; Huang, W.; (2010) "An Analytical Evaluation of Network Security Modelling Techniques Applied to Manage Threats," Broadband, Wireless Computing, Communication and Applications (BWCCA), 2010 International Conference on , pp.117-123, 4-6 Nov. 2010
    Publisher
    IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
    URI
    http://hdl.handle.net/10547/270577
    DOI
    10.1109/BWCCA.2010.58
    Additional Links
    http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5633801
    Type
    Conference papers, meetings and proceedings
    Language
    en
    ISBN
    9780769542362
    ae974a485f413a2113503eed53cd6c53
    10.1109/BWCCA.2010.58
    Scopus Count
    Collections
    Centre for Research in Distributed Technologies (CREDIT)

    entitlement

     
    DSpace software (copyright © 2002 - 2021)  DuraSpace
    Quick Guide | Contact Us
    Open Repository is a service operated by 
    Atmire NV
     

    Export search results

    The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

    By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

    To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

    After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.