Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14365/801
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kondakçı, Süleyman | - |
dc.date.accessioned | 2023-06-16T12:47:36Z | - |
dc.date.available | 2023-06-16T12:47:36Z | - |
dc.date.issued | 2012 | - |
dc.identifier.issn | 1939-0114 | - |
dc.identifier.issn | 1939-0122 | - |
dc.identifier.uri | https://doi.org/10.1002/sec.591 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.14365/801 | - |
dc.description.abstract | This paper presents a new concept for information security assessments while promoting several areas of its application. Threat generation, attack pattern analysis, quantitative risk computation, and network security monitoring locally or remotely are the major application areas of this concept. Instead of testing assets one by one, by applying separate repetitive attacks and assessments, the presented system generates and executes attacks once on a sample group, composes assessment data, and uses the data for the assessment of an entire network. This unique approach can be used as a model to guide the development of tool-based assessment systems, intelligent network security analysis, monitoring systems, and also as a complementary function in information security test and evaluation laboratories. Copyright (C) 2012 John Wiley & Sons, Ltd. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Wiley-Hindawi | en_US |
dc.relation.ispartof | Securıty And Communıcatıon Networks | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | network security | en_US |
dc.subject | risk assessment | en_US |
dc.subject | information assurance | en_US |
dc.subject | false attack discrimination | en_US |
dc.subject | Intrusion Detection | en_US |
dc.title | Intelligent network security assessment with modeling and analysis of attack patterns | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1002/sec.591 | - |
dc.identifier.scopus | 2-s2.0-84870223871 | en_US |
dc.department | İzmir Ekonomi Üniversitesi | en_US |
dc.authorid | Kondakçı, Süleyman/0000-0001-5150-3220 | - |
dc.authorwosid | Kondakçı, Süleyman/AAU-8212-2021 | - |
dc.authorscopusid | 15061511300 | - |
dc.identifier.volume | 5 | en_US |
dc.identifier.issue | 12 | en_US |
dc.identifier.startpage | 1471 | en_US |
dc.identifier.endpage | 1486 | en_US |
dc.identifier.wos | WOS:000311403800018 | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.identifier.scopusquality | N/A | - |
item.grantfulltext | embargo_20300101 | - |
item.openairetype | Article | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.fulltext | With Fulltext | - |
item.languageiso639-1 | en | - |
item.cerifentitytype | Publications | - |
crisitem.author.dept | 05.05. Computer Engineering | - |
Appears in Collections: | Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
Files in This Item:
File | Size | Format | |
---|---|---|---|
801.pdf Until 2030-01-01 | 1.51 MB | Adobe PDF | View/Open Request a copy |
CORE Recommender
SCOPUSTM
Citations
4
checked on Nov 20, 2024
WEB OF SCIENCETM
Citations
4
checked on Nov 20, 2024
Page view(s)
134
checked on Nov 18, 2024
Download(s)
6
checked on Nov 18, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.