Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14365/1393
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKondakçı, Süleyman-
dc.date.accessioned2023-06-16T14:11:27Z-
dc.date.available2023-06-16T14:11:27Z-
dc.date.issued2015-
dc.identifier.issn0951-8320-
dc.identifier.issn1879-0836-
dc.identifier.urihttps://doi.org/10.1016/j.ress.2014.09.021-
dc.identifier.urihttps://hdl.handle.net/20.500.14365/1393-
dc.description.abstractThis article presents a concise reliability analysis of network security abstracted from stochastic modeling, reliability, and queuing theories. Network security analysis is composed of threats, their impacts, and recovery of the failed systems. A unique framework with a collection of the key reliability models is presented here to guide the determination of the system reliability based on the strength of malicious acts and performance of the recovery processes. A unique model, called Attack-obstacle model, is also proposed here for analyzing systems with immunity growth features. Most computer science curricula do not contain courses in reliability modeling applicable to different areas of computer engineering. Hence, the topic of reliability analysis is often too diffuse to most computer engineers and researchers dealing with network security. This work is thus aimed at shedding some light on this issue, which can be useful in identifying models, their assumptions and practical parameters for estimating the reliability of threatened systems and for assessing the performance of recovery facilities. It can also be useful for the classification of processes and states regarding the reliability of information systems. Systems with stochastic behaviors undergoing queue operations and random state transitions can also benefit from the approaches presented here. (C) 2014 Elsevier Ltd. All rights reserved.en_US
dc.language.isoenen_US
dc.publisherElsevier Sci Ltden_US
dc.relation.ispartofRelıabılıty Engıneerıng & System Safetyen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectAvailability modelingen_US
dc.subjectReliabilityen_US
dc.subjectSecurityen_US
dc.subjectRisk assessmenten_US
dc.subjectOf-N Systemsen_US
dc.subjectService Reliabilityen_US
dc.subjectBayesian Networksen_US
dc.subjectAvailabilityen_US
dc.subjectPerformanceen_US
dc.subjectModelen_US
dc.subjectOptimizationen_US
dc.titleAnalysis of information security reliability: A tutorialen_US
dc.typeArticleen_US
dc.identifier.doi10.1016/j.ress.2014.09.021-
dc.identifier.scopus2-s2.0-84908408965en_US
dc.departmentİzmir Ekonomi Üniversitesien_US
dc.authoridKondakçı, Süleyman/0000-0001-5150-3220-
dc.authorwosidKondakçı, Süleyman/AAU-8212-2021-
dc.authorscopusid15061511300-
dc.identifier.volume133en_US
dc.identifier.startpage275en_US
dc.identifier.endpage299en_US
dc.identifier.wosWOS:000345469600027en_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.identifier.scopusqualityQ1-
dc.identifier.wosqualityQ1-
item.grantfulltextreserved-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
item.openairetypeArticle-
item.fulltextWith Fulltext-
item.languageiso639-1en-
crisitem.author.dept05.05. Computer Engineering-
Appears in Collections:Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Files in This Item:
File SizeFormat 
435.pdf
  Restricted Access
1.17 MBAdobe PDFView/Open    Request a copy
Show simple item record



CORE Recommender

SCOPUSTM   
Citations

16
checked on Oct 2, 2024

WEB OF SCIENCETM
Citations

9
checked on Oct 2, 2024

Page view(s)

140
checked on Sep 30, 2024

Download(s)

6
checked on Sep 30, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.