Academic literature on the topic 'Metric Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Metric Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Metric Security"

1

Neto, Afonso Araújo, and Marco Vieira. "Benchmarking Untrustworthiness." International Journal of Dependable and Trustworthy Information Systems 1, no. 2 (2010): 32–54. http://dx.doi.org/10.4018/jdtis.2010040102.

Full text
Abstract:
Benchmarking security is hard and, although there are many proposals of security metrics in the literature, no consensual quantitative security metric has been previously proposed. A key difficulty is that security is usually more influenced by what is unknown about a system than by what is known. In this paper, the authors propose the use of an untrustworthiness metric for benchmarking security. This metric, based on the idea of quantifying and exposing the trustworthiness relationship between a system and its owner, represents a powerful alternative to traditional security metrics. As an exa
APA, Harvard, Vancouver, ISO, and other styles
2

Shan, Chun, Benfu Jiang, Jingfeng Xue, Fang Guan, and Na Xiao. "An Approach for Internal Network Security Metric Based on Attack Probability." Security and Communication Networks 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/3652170.

Full text
Abstract:
A network security metric may provide quantifiable evidence to assist security practitioners in securing computer networks. However, research on security metrics based on attack graph is not applicable to the characteristics of internal attack; therefore we propose an internal network security metric method based on attack probability. Our approach has the following benefits: it provides the method of attack graph simplification with monitoring event node which could solve the attack graph exponential growth with the network size, while undermining the disguise of internal attacks and improvin
APA, Harvard, Vancouver, ISO, and other styles
3

Díaz, Álvaro, Javier González-Bayon, and Pablo Sánchez. "Security Estimation in Wireless Sensor Network Simulator." Journal of Circuits, Systems and Computers 25, no. 07 (2016): 1650067. http://dx.doi.org/10.1142/s0218126616500675.

Full text
Abstract:
Sensor nodes are low-power and low-cost devices with the requirement of a long autonomous lifetime. Therefore, the nodes have to use the available power carefully and avoid expensive computations or radio transmissions. In addition, as some wireless sensor networks (WSNs) process sensitive data, selecting a security protocol is vital. Cryptographic methods used in WSNs should fulfill the constraints of sensor nodes and should be evaluated for their security and power consumption. WSN engineers use several metrics to obtain estimations prior to network deployment. These metrics are usually rela
APA, Harvard, Vancouver, ISO, and other styles
4

Yee, George O. M. "Designing Sound Security Metrics." International Journal of Systems and Software Security and Protection 10, no. 1 (2019): 1–21. http://dx.doi.org/10.4018/ijsssp.2019010101.

Full text
Abstract:
This article begins with an introduction to security metrics, describing the need for security metrics, followed by a discussion of the nature of security metrics, including the challenges found with some security metrics used in the past. The article then discusses what makes a sound security metric and proposes a rigorous step-by-step method that can be applied to design sound security metrics, and to test existing security metrics to see if they are sound metrics. This is followed by a discussion of the feasibility of having scientifically-based security metrics and whether or not such metr
APA, Harvard, Vancouver, ISO, and other styles
5

Shao, Yanli, Jingru Zhao, Xingqi Wang, Weiwei Wu, and Jinglong Fang. "Research on Cross-Company Defect Prediction Method to Improve Software Security." Security and Communication Networks 2021 (August 24, 2021): 1–19. http://dx.doi.org/10.1155/2021/5558561.

Full text
Abstract:
As the scale and complexity of software increase, software security issues have become the focus of society. Software defect prediction (SDP) is an important means to assist developers in discovering and repairing potential defects that may endanger software security in advance and improving software security and reliability. Currently, cross-project defect prediction (CPDP) and cross-company defect prediction (CCDP) are widely studied to improve the defect prediction performance, but there are still problems such as inconsistent metrics and large differences in data distribution between sourc
APA, Harvard, Vancouver, ISO, and other styles
6

Tjirare, D., and F. Bhunu Shava. "Developing Security Metrics to Evaluate Employee Awareness: a Case of a Ministry in Namibia." Namibian Journal for Research, Science and Technology 1, no. 1 (2020): 11–18. http://dx.doi.org/10.54421/njrst.v1i1.5.

Full text
Abstract:
Employees that lack security awareness may cause a threat to an organisation unintentionally. A mixed research method was used to conduct a case study to evaluate the security awareness levels of employees in one ministry to reduce the risk associated with security threats.A survey using a questionnaire was carried out with the ministry employees from four different departments. Collected data was quantitatively analysed to gauge the security risk of the organisation. Analysed survey results were used todevelop security metrics using the Goal Question Metric approach and security objectives as
APA, Harvard, Vancouver, ISO, and other styles
7

Jouini, Mouna, and Latifa Ben Arfa Rabai. "A Security Risk Management Metric for Cloud Computing Systems." International Journal of Organizational and Collective Intelligence 4, no. 3 (2014): 1–21. http://dx.doi.org/10.4018/ijoci.2014070101.

Full text
Abstract:
Cloud computing is a growing technology used by several organizations because it presents a cost effective policy to manage and control Information Technology (IT). It delivers computing services as a public utility rather than a personal one. However, despite these benefits, it presents many challenges including access control and security problems. In order to assess security risks, the paper gives an overview of security risk management metrics. Then, it illustrates the use of a cyber security measure to describe an economic security model for cloud computing system. Moreover, it proposes a
APA, Harvard, Vancouver, ISO, and other styles
8

Le, Ngoc Thuy, and Doan B. Hoang. "A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud Security." Journal of Telecommunications and the Digital Economy 7, no. 1 (2019): 37–56. http://dx.doi.org/10.18080/jtde.v7n1.181.

Full text
Abstract:
Securing cyber infrastructures has become critical because they are increasingly exposed to attackers while accommodating a huge number of IoT devices and supporting numerous sophisticated emerging applications. Security metrics are essential for assessing the security risks and making effective decisions concerning system security. Many security metrics rely on mathematical models, but are mainly based on empirical data, qualitative methods, or compliance checking, and this renders the outcome far from satisfactory. Computing the probability of an attack, or more precisely a threat that mater
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Kisoo, Sangho Lee, Yeowung Yun, Jaemin Choi, and Hyungjin Mun. "Security Evaluation Metric of Windows-Based Information Security Products." Indian Journal of Science and Technology 8, S8 (2015): 10. http://dx.doi.org/10.17485/ijst/2015/v8is8/71501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ito, Kosuke, Shuji Morisaki, and Atsuhiro Goto. "IoT Security-Quality-Metrics Method and Its Conformity with Emerging Guidelines." IoT 2, no. 4 (2021): 761–85. http://dx.doi.org/10.3390/iot2040038.

Full text
Abstract:
This study proposes a security-quality-metrics method tailored for the Internet of things (IoT) and evaluates conformity of the proposed approach with pertinent cybersecurity regulations and guidelines for IoT. Cybersecurity incidents involving IoT devices have recently come to light; consequently, IoT security correspondence has become a necessity. The ISO 25000 series is used for software; however, the concept of security as a quality factor has not been applied to IoT devices. Because software vulnerabilities were not the device vendors’ responsibility as product liability, most vendors did
APA, Harvard, Vancouver, ISO, and other styles
More sources
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!