Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14365/3626
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kondakçı, Süleyman | - |
dc.date.accessioned | 2023-06-16T15:01:49Z | - |
dc.date.available | 2023-06-16T15:01:49Z | - |
dc.date.issued | 2010 | - |
dc.identifier.isbn | 9.78077E+12 | - |
dc.identifier.uri | https://doi.org/10.1109/SocialCom.2010.141 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.14365/3626 | - |
dc.description | IEEE Computer Society | en_US |
dc.description | 2nd IEEE International Conference on Social Computing, SocialCom 2010, 2nd IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010 -- 20 August 2010 through 22 August 2010 -- Minneapolis, MN -- 82366 | en_US |
dc.description.abstract | This paper presents a causal assessment model based on Bayesian Belief Networks to analyze and quantify information security risks caused by various threat sources. The proposed model can be applied to a variety of information security evaluation tasks, risk assessment, software development projects, IT products, and other decision making systems. This unique concept can also be used for the determination of joint risk propagation and interdependence structures within computer networks, information systems, and other engineering tasks in general. By this manner, we can facilitate the determination of probabilistic outputs caused by some precalculated input probabilities or by marginal/joint probabilities found so far within the chain of an interdependence structure. © 2010 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartof | Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Information security | en_US |
dc.subject | Quantitative risk assessment | en_US |
dc.subject | Risk modeling | en_US |
dc.subject | Threat modeling | en_US |
dc.subject | Assessment models | en_US |
dc.subject | Bayesian Belief Networks | en_US |
dc.subject | Decision-making systems | en_US |
dc.subject | Engineering tasks | en_US |
dc.subject | Information security | en_US |
dc.subject | IT products | en_US |
dc.subject | Probabilistic output | en_US |
dc.subject | Quantitative risk assessment | en_US |
dc.subject | Risk modeling | en_US |
dc.subject | Security risk assessments | en_US |
dc.subject | Software development projects | en_US |
dc.subject | Threat modeling | en_US |
dc.subject | Bayesian networks | en_US |
dc.subject | Decision making | en_US |
dc.subject | Risk assessment | en_US |
dc.subject | Software design | en_US |
dc.subject | Network security | en_US |
dc.title | Network security risk assessment using bayesian belief networks | en_US |
dc.type | Conference Object | en_US |
dc.identifier.doi | 10.1109/SocialCom.2010.141 | - |
dc.identifier.scopus | 2-s2.0-78649260960 | en_US |
dc.authorscopusid | 15061511300 | - |
dc.identifier.startpage | 952 | en_US |
dc.identifier.endpage | 960 | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.identifier.scopusquality | N/A | - |
dc.identifier.wosquality | N/A | - |
item.grantfulltext | reserved | - |
item.openairetype | Conference Object | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.fulltext | With Fulltext | - |
item.languageiso639-1 | en | - |
item.cerifentitytype | Publications | - |
crisitem.author.dept | 05.05. Computer Engineering | - |
Appears in Collections: | Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection |
Files in This Item:
File | Size | Format | |
---|---|---|---|
2716.pdf Restricted Access | 303 kB | Adobe PDF | View/Open Request a copy |
CORE Recommender
SCOPUSTM
Citations
28
checked on Nov 20, 2024
Page view(s)
68
checked on Nov 18, 2024
Download(s)
6
checked on Nov 18, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.