Filters








99,039 Hits in 4.5 sec

INFORMATION SECURITY RISK ASSESSMENT UNDER UNCERTAINTY USING DYNAMIC BAYESIAN NETWORKS

R. Sarala .
2014 International Journal of Research in Engineering and Technology  
The Dynamic Bayesian Network models help to detect the uncertain relationship associated with the risk event.  ...  This risk management process should be carried out periodically to review the security of the information assets in the organization.  ...  Alireza Tamjidyamcholo [9] proposed an InfoSecu risk Algorithm which can effectively reduce the risk derived from uncertain environments.  ... 
doi:10.15623/ijret.2014.0319055 fatcat:2ofmvrw53jectoeyng3u7oypya

Special issue: fuzzy decision making and applications in knowledge management

Justin Zhang
2019 Journal of Intelligent & Fuzzy Systems  
This special issue of the Journal of Intelligent & Fuzzy Systems contains selected articles of fuzzy decision making and applications in knowledge management.  ...  ; Study on the Security of Information System Authentication Scheme Based on the Fuzzy Number Intuitionistic Fuzzy Information; An intuitionistic fuzzy multi-attribute group decision making method with  ...  under 2- tuple Linguistic Environment; Research on Hotel Supply Chain Risk Assessment with dual gener- alized triangular fuzzy Bonferroni mean operators; Model for Evaluating the Art Education Teach-  ... 
doi:10.3233/jifs-179221 fatcat:z3fozaxakzd2hn7oftoc4c5jeu

Special issue on optimization with uncertain information: a perspective of soft computing

Yaodong Ni, Kai Yao, Xiangfeng Yang
2018 Soft Computing - A Fusion of Foundations, Methodologies and Applications  
Yan and Ji (2017) investigate in the paper "Portfolio selection model of oil projects under uncertain environment" an oil project optimal portfolio selection under uncertain environment where the cash  ...  The paper "Expected loss of uncertain random system" by Liu and Ralescu (2017) proposes a concept of expected loss to quantify the risk of an uncertain random system, and derives a formula to calculate  ... 
doi:10.1007/s00500-018-3338-z fatcat:j2xey3wxizdnjfv4clucaju3t4

Solving Civil Engineering Problems by Means of Fuzzy and Stochastic MCDM Methods: Current State and Future Research

Jurgita Antucheviciene, Zdeněk Kala, Mohamed Marzouk, Egidijus Rytas Vaidogas
2015 Mathematical Problems in Engineering  
These areas are design of sustainable and energy efficient buildings, building information modelling, and assurance of security and safety of built property.  ...  Prospects of using MCDM under uncertainty in developing areas of civil engineering are discussed in brief.  ...  Acknowledgment The part of the paper done by the author from Czech Republic has been worked out under Project no. LO1408 "AdMAs UP."  ... 
doi:10.1155/2015/362579 fatcat:ks4boboz5zaqdakn45hk5v6bmy

Access Control Based on Trust Policy in Open Grid Environment

Li Ting Gao, Zhen Yan Wang
2013 Advanced Materials Research  
This paper proposed a model for user security management.  ...  The experiments show that this model combines trust level with access control mechanism; it can enhance the user security management.  ...  This dynamic and uncertain behavior will poses a great security risk to the system.  ... 
doi:10.4028/www.scientific.net/amr.756-759.390 fatcat:35nvd53wpjexrjyps2zwimxzxy

A Cooperative Model for IS Security Risk Management in Distributed Environment

Nan Feng, Chundong Zheng
2014 The Scientific World Journal  
In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs).  ...  In this paper, we develop a cooperative model for IS security risk management in a distributed environment.  ...  Therefore, for more effectively assessing the security risk level of the IS in a distributed environment, it is critical to develop a system for the exchange of security information among the interconnected  ... 
doi:10.1155/2014/167497 pmid:24563626 pmcid:PMC3916018 fatcat:zld4xt4gdvbwtjq2qspj4kpska

A Survey on the Evolution of Risk Evaluation for Information Systems Security

Yu Zhiwei, Ji Zhongyuan
2012 Energy Procedia  
background and an idea of business process-oriented risk evaluation methodology of information systems security is presented.  ...  In order to study the risk evaluation of the information systems security effectively and the laws of the developments of risk evaluation, we have made a detailed analysis from the purpose, the objective  ...  Risk evaluation Risk management is the process of establishing and maintaining information system security within an organization [2] , which aims to "identify, measure and control uncertain events" in  ... 
doi:10.1016/j.egypro.2012.02.240 fatcat:kg74ztoviveedkvaff7vgzbqta

Method of Information Security Risk Assessment Based on Improved Fuzzy Theory of Evidence

Xuepeng Huang, Wei Xu
2018 International Journal of Online Engineering (iJOE)  
The hierarchy model for the information systems risk assessment was established firstly, and then fuzzy sets were introduced into theory of evidence.  ...  An illustration example indicates that the method is feasible and effective, and provides reasonable data for constituting the risk control strategy of the information systems security.</p>  ...  Acknowledgment It is a project supported by Social Security Administration of Hubei Province Social Science key research bases (2017-19) , General scientific research project of Hubei University of Police  ... 
doi:10.3991/ijoe.v14i03.8422 fatcat:klfymccx4zhxfhxi7uj2xrdzva

Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees

Wenli Shang, Tianyu Gong, Chunyu Chen, Jing Hou, Peng Zeng
2019 Security and Communication Networks  
Information security risk assessment for industrial control system is usually influenced by uncertain factors.  ...  For effectively dealing with problem that the uncertainty and quantification difficulties are caused by subjective and objective factors in the assessment process, an information security risk assessment  ...  The authors would also like to acknowledge the helpful comments and suggestions of the industry control system security software group. Their efforts are greatly appreciated.  ... 
doi:10.1155/2019/3574675 fatcat:uvh36oqxlrfi5m4n2rl5xkwcge

Probabilistic Risk Assessment for Security Requirements: A Preliminary Study

Seok-Won Lee
2011 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement  
identify critical influences among information entities in a complex and uncertain operational environment.  ...  The security requirements and their causal relationships are represented using MEBN (Multi-Entities Bayesian Networks) logic that constructs an explicit formal risk assessment model that supports evidence-driven  ...  Also, it combines uncertain definition model with causal inference model and combines information from different causal models.  ... 
doi:10.1109/ssiri.2011.12 dblp:conf/ssiri/Lee11 fatcat:u5d4ea25pfbw5pgdgp6znrsini

A Review of Transmission Development Planning Based on Risk Evaluation

Cheng Lin, Xin Yu, Min Liu, Qinfeng Ma, D. Mingxing, X. Guosheng
2015 MATEC Web of Conferences  
It introduces the transmission network flexible planning method based on the uncertain factors, the mathematical optimization method and a heuristic method.  ...  The paper summarizes the methods about the transmission development planning which considers risk factors.  ...  Monte Carlo method and interval power flow simulations to testing whether if it could ensure safety of the system under uncertain environment or not.  ... 
doi:10.1051/matecconf/20153108005 fatcat:juqqs5gjtbgzjgwky3t5dngd3a

Multi-Objectives Model to Process Security Risk Assessment Based on AHP-PSO

Gamal A. Awad, Elrasheed I. Sultan, Noraziah Ahmad, Norafida Ithnan, A. H. Beg
2011 Modern Applied Science  
Nowadays the security risk assessment play a crucial role, which is applied to the entire life cycle of information systems and communication technologies but still so many models for security risk assessment  ...  control strategy of the information systems security.  ...  How to measure and evaluate the information systems security situation is worthy of an in-depth study by researchers. Risk assessment is the core and key of information system security.  ... 
doi:10.5539/mas.v5n3p246 fatcat:shqtk4pl4zh6lf3tcsuq6xfgxu

RISK, SECURITY, AND DISASTER MANAGEMENT

Louise K. Comfort
2005 Annual review of political science (Palo Alto, Calif. Print)  
that prove vulnerable in uncertain environments.  ...  Key Words uncertainty, resilience, networks, information asymmetry, adaptive learning ■ Abstract This review examines the policies and practices that address the evolving conditions of risk, security,  ...  Wildavsky's lasting insight on this problem is that the degree of risk that a society accepts in an uncertain environment is a matter of choice.  ... 
doi:10.1146/annurev.polisci.8.081404.075608 fatcat:kyoymy5brbc25j6qtqy7g7oruq

METHODICAL APPROACH TO THE QUANTIFICATION OF ENTERPRISE FINANCIAL SECURITY LEVEL

B. V. Samorodov, O. O. Sosnovska, M. O. Zhytar, J. V. Ananieva
2020 Financial and credit activity problems of theory and practice  
risk of certain indices of the financial condition from the established limits of normative values and to identify possible threats to the financial security of an enterprise.  ...  It is substantiated that the use of the Monte Carlo method allows not only to determine the probability of a future level of an enterprise financial security, but also to obtain the assessment of the deviation  ...  operation of an enterprise in an uncertain economic environment.  ... 
doi:10.18371/fcaptp.v1i32.200521 fatcat:pjthbwqrjjbptadhchgbcf3rem

Team Situation Awareness Using Web-based Fuzzy Group Decision Support Systems

Jie LU, Guangquan ZHANG, Fengjie WU
2008 International Journal of Computational Intelligence Systems  
Applications may range from information technology and energy supply to environmental, societal and security related topics.  ...  the ability of handling uncertain information.  ...  Acknowledgements This research was supported in part by the Australian Research Council (ARC) under discovery grants DP0559213 and DP0880739.  ... 
doi:10.2991/ijcis.2008.1.1.4 fatcat:jnmiqyza7vda3ozky66v4qegsa
« Previous Showing results 1 — 15 out of 99,039 results