Bayesian Network Methodology for Cyber Security
نویسنده
چکیده
منابع مشابه
Preparation of Papers in a Two-Column Format for the 21st Annual Conference of the IEEE Industrial Electronics Society
Extensive use of digital systems and networks is causing the problem of the cyber security to safety related industries like research reactors. The aim of cyber security study, in this article, is to develop a cyber-security risk analysis model based on activityquality & Instrumentation & Control (I&C) architecture for the safety of nuclear industry. Activity-quality is a qualitative number sho...
متن کاملA Specification-based Intrusion Detection Framework for Cyber-physical Environment in Electric Power System
The emergence of high-speed networks in electric power systems creates a tight interaction of cyber infrastructure with the physical infrastructure and makes the power system susceptible to cyber penetration and attacks. To address this problem, this paper proposes an innovative approach to develop a specification-based intrusion detection framework that leverages available information provided...
متن کاملDelft University of Technology Bayesian Network Models in Cyber Security: A Systematic Review
Bayesian Networks (BNs) are an increasingly popular modelling technique in cyber security especially due to their capability to overcome data limitations. This is also exemplified by the growth of BN models development in cyber security. However, a comprehensive comparison and analysis of these models is missing. In this paper, we conduct a systematic review of the scientific literature and ide...
متن کاملحاکمیت شبکهای در نهادهای پژوهشی امنیت سایبری
Governments change their governance style according to social, political and economic conditions. Cyber security technology is among today’s most changeable technologies, which is a critical key to the national security. Because of the weaknesses in the interaction among syber security research organizations, introducing a model for utilizing all existing capabilities can be an appro...
متن کاملA Probabilistic Ontology for Large-Scale IP Geolocation
Mapping IP addresses to physical locations is important for a host of cyber security applications. Examples include identifying the origin of cyber attacks, protecting against fraud in internet commerce, screening emails for phishing, and enforcing restrictions on commerce with sanctioned countries. Simultaneous geolocation of large numbers of IP hosts is needed for cyber situation awareness. E...
متن کامل