期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Comprehensive Information Security Evaluation Model Based on Multi-Level Decomposition Feedback for IoT 被引量:3
1
作者 Jinxin Zuo Yueming Lu +3 位作者 Hui Gao Ruohan Cao Ziyv Guo Jim Feng 《Computers, Materials & Continua》 SCIE EI 2020年第10期683-704,共22页
The development of the Internet of Things(IoT)calls for a comprehensive in-formation security evaluation framework to quantitatively measure the safety score and risk(S&R)value of the network urgently.In this pape... The development of the Internet of Things(IoT)calls for a comprehensive in-formation security evaluation framework to quantitatively measure the safety score and risk(S&R)value of the network urgently.In this paper,we summarize the architecture and vulnerability in IoT and propose a comprehensive information security evaluation model based on multi-level decomposition feedback.The evaluation model provides an idea for information security evaluation of IoT and guides the security decision maker for dynamic protection.Firstly,we establish an overall evaluation indicator system that includes four primary indicators of threat information,asset,vulnerability,and management,respectively.It also includes eleven secondary indicators of system protection rate,attack detection rate,confidentiality,availability,controllability,identifiability,number of vulnerabilities,vulnerability hazard level,staff organization,enterprise grading and service continuity,respectively.Then,we build the core algorithm to enable the evaluation model,wherein a novel weighting technique is developed and a quantitative method is proposed to measure the S&R value.Moreover,in order to better supervise the performance of the proposed evaluation model,we present four novel indicators includes residual risk,continuous conformity of residual risk,head-to-tail consistency and decrease ratio,respectively.Simulation results show the advantages of the proposed model in the evaluation of information security for IoT. 展开更多
关键词 IOT information security quantitative evaluation safety score residual risk
下载PDF
Security-Critical Components Recognition Algorithm for Complex Heterogeneous Information Systems
2
作者 Jinxin Zuo Yueming Lu +4 位作者 Hui Gao Tong Peng Ziyv Guo Tong An Enjie Liu 《Computers, Materials & Continua》 SCIE EI 2021年第8期2579-2595,共17页
With the skyrocketing development of technologies,there are many issues in information security quantitative evaluation(ISQE)of complex heterogeneous information systems(CHISs).The development of CHIS calls for an ISQ... With the skyrocketing development of technologies,there are many issues in information security quantitative evaluation(ISQE)of complex heterogeneous information systems(CHISs).The development of CHIS calls for an ISQE model based on security-critical components to improve the efficiency of system security evaluation urgently.In this paper,we summarize the implication of critical components in different filed and propose a recognition algorithm of security-critical components based on threat attack tree to support the ISQE process.The evaluation model establishes a framework for ISQE of CHISs that are updated iteratively.Firstly,with the support of asset identification and topology data,we sort the security importance of each asset based on the threat attack tree and obtain the security-critical components(set)of the CHIS.Then,we build the evaluation indicator tree of the evaluation target and propose an ISQE algorithm based on the coefficient of variation to calculate the security quality value of the CHIS.Moreover,we present a novel indicator measurement uncertainty aiming to better supervise the performance of the proposed model.Simulation results show the advantages of the proposed algorithm in the evaluation of CHISs. 展开更多
关键词 Complex heterogeneous information system security-critical component threat attack tree information security quantitative evaluation
下载PDF
Curvature range measurements of the arcuate fasciculus using diffusion tensor tractography
3
作者 Dong Hoon Lee Cheol Pyo Hong +3 位作者 Yong Hyun Kwon Yoon Tae Hwang Joong Hwi Kim Ji Won Park 《Neural Regeneration Research》 SCIE CAS CSCD 2013年第3期244-250,共7页
Because Broca's area and Wernicke's area in the brain are connected by the arcuate fasciculus, understanding the anatomical location and morphometry of the arcuate fasciculus can help in the treatment of patients wi... Because Broca's area and Wernicke's area in the brain are connected by the arcuate fasciculus, understanding the anatomical location and morphometry of the arcuate fasciculus can help in the treatment of patients with aphasia. We measured the horizontal and vertical curvature ranges of the arcuate fasciculus in both hemispheres in 12 healthy subjects using diffusion tensor tractography. In the right hemisphere, the direct curvature range and indirect curvature range values of the arcuate fasciculus horizontal part were 121.13 ± 5.89 and 25.99 ± 3.01 degrees, respectively, and in the left hemisphere, the values were 121.83 ± 5.33 and 27.40 ± 2.96 degrees, respectively. In the right hemisphere, the direct curvature range and indirect curvature range values of the arcuate fasciculus vertical part were 43.97 ± 7.98 and 30.15 ± 3.82 degrees, respectively, and in the left hemisphere, the values were 39.39 ± 4.42 and 24.08 ± 4.34 degrees, respectively. We believe that the measured curvature ranges are important data for localization and quantitative assessment of specific neuronal pathways in patients presenting with arcuate fasciculus abnormalities. 展开更多
关键词 neural regeneration neuroimaging clinical practice diffusion tensor tractography diffusion tensor imaging arcuate fasciculus direct curvature range indirect curvature range anatomical location quantitative information APHASIA Broca’s area Wernicke’s area arched fiber grant-supported paper photographs-containing paper NEUROREGENERATION
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部