Comprehensive Information Security Evaluation Model Based on Multi-Level Decomposition Feedback for IoT

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comprehensive Evaluation Model for Computer Network Security with Linguistic Information

In this paper, we investigate the multiple attribute group decision making (MAGDM) problems for for evaluating the computer network security with linguistic information. We utilize the pure linguistic weighted arithmetic averaging (PLWAA) operator to aggregate the linguistic information corresponding to each alternative and get the overall value of the alternatives, then rank the alternatives a...

متن کامل

mortality forecasting based on lee-carter model

over the past decades a number of approaches have been applied for forecasting mortality. in 1992, a new method for long-run forecast of the level and age pattern of mortality was published by lee and carter. this method was welcomed by many authors so it was extended through a wider class of generalized, parametric and nonlinear model. this model represents one of the most influential recent d...

15 صفحه اول

A Security Model for Multi - level Object - Oriented DatabasesBased on

In this paper, we employ the view model given by Bertino to propose a new design approach for a secure multi-level object-oriented database system. The central idea is to provide the user with a multi-level view derived from a single-level secure object-oriented database. Hence the database operations performed on the multi-level views are decomposed into a set of operations on the single-level...

متن کامل

Hiding Information in Multi Level Security Systems

In this paper we analyze the possibility for malicious agents to transmit an information possibly hidden in a Multi Level Security System via a covert channel. We give a framework for which we get two decidability results. Firstly, given a code and a system one can decide whether the system allows a covert channel for this code. Secondly, one can decide whether there exists a code to transmit o...

متن کامل

IoT Security Techniques Based on Machine Learning

Internet of things (IoT) that integrate a variety of devices into networks to provide advanced and intelligent services have to protect user privacy and address attacks such as spoofing attacks, denial of service attacks, jamming and eavesdropping. In this article, we investigate the attack model for IoT systems, and review the IoT security solutions based on machine learning techniques includi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers, Materials & Continua

سال: 2020

ISSN: 1546-2226

DOI: 10.32604/cmc.2020.010793