Comprehensive Information Security Evaluation Model Based on Multi-Level Decomposition Feedback for IoT
نویسندگان
چکیده
منابع مشابه
Comprehensive Evaluation Model for Computer Network Security with Linguistic Information
In this paper, we investigate the multiple attribute group decision making (MAGDM) problems for for evaluating the computer network security with linguistic information. We utilize the pure linguistic weighted arithmetic averaging (PLWAA) operator to aggregate the linguistic information corresponding to each alternative and get the overall value of the alternatives, then rank the alternatives a...
متن کاملmortality forecasting based on lee-carter model
over the past decades a number of approaches have been applied for forecasting mortality. in 1992, a new method for long-run forecast of the level and age pattern of mortality was published by lee and carter. this method was welcomed by many authors so it was extended through a wider class of generalized, parametric and nonlinear model. this model represents one of the most influential recent d...
15 صفحه اولA Security Model for Multi - level Object - Oriented DatabasesBased on
In this paper, we employ the view model given by Bertino to propose a new design approach for a secure multi-level object-oriented database system. The central idea is to provide the user with a multi-level view derived from a single-level secure object-oriented database. Hence the database operations performed on the multi-level views are decomposed into a set of operations on the single-level...
متن کاملHiding Information in Multi Level Security Systems
In this paper we analyze the possibility for malicious agents to transmit an information possibly hidden in a Multi Level Security System via a covert channel. We give a framework for which we get two decidability results. Firstly, given a code and a system one can decide whether the system allows a covert channel for this code. Secondly, one can decide whether there exists a code to transmit o...
متن کاملIoT Security Techniques Based on Machine Learning
Internet of things (IoT) that integrate a variety of devices into networks to provide advanced and intelligent services have to protect user privacy and address attacks such as spoofing attacks, denial of service attacks, jamming and eavesdropping. In this article, we investigate the attack model for IoT systems, and review the IoT security solutions based on machine learning techniques includi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers, Materials & Continua
سال: 2020
ISSN: 1546-2226
DOI: 10.32604/cmc.2020.010793