Risk assessment model based on fuzzy Petri nets
Aiming at the complex in the process of network security risk assessment, the asset, vulnerability and threat were used as the major factors in security assessment to establish the hierarchical index system for security assessment. The concept of credibility was introduced, and the security risk ass...
Saved in:
Main Authors: | Xiang GAO, Yue-fei ZHU, Sheng-li LIU, Jin-long FEI, Long LIU |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2013-08-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.z1.016/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Representation and termination analysis for ECA rules based on extended Petri net
by: Li-chen ZHANG, et al.
Published: (2013-03-01) -
Model of fuzzy risk assessment of the information system
by: ZHAO Dong-mei1, et al.
Published: (2007-01-01) -
Concurrent software fine‐coarse‐grained automatic modelling by Coloured Petri Nets for model checking
by: Wenjie Zhong, et al.
Published: (2023-02-01) -
Research on two-phase grid task scheduling based on Petri nets
by: XIONG Zeng-gang 1, et al.
Published: (2009-01-01) -
Survivability model for reconfigurable service carrying network based on the stochastic Petri net
by: Liang ZHAO, et al.
Published: (2016-03-01)