Skip to main navigation Skip to search Skip to main content

An analytical evaluation of network security modelling techniques applied to manage threats

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Citations (Scopus)

Abstract

The current ubiquity of information coupled with the reliance on such data by businesses has led to a great deal of resources being deployed to ensure the security of this information. Threats can come from a number of sources and the dangers from those insiders closest to the source have increased significantly recently. This paper focuses on techniques used to identify and manage threats as well as the measures that every organisation should consider to put into action. A novel game-based onion skin model has been proposed, combining techniques used in theory-based and hardware-based hardening strategies.
Original languageEnglish
Title of host publicationnan
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9780769542362
ISBN (Print)9780769542362
DOIs
Publication statusPublished - 11 Nov 2010
Event2010 International Conference on Broadband, Wireless Computing, Communication and Applications - Fukuoka
Duration: 4 Nov 20106 Nov 2010

Conference

Conference2010 International Conference on Broadband, Wireless Computing, Communication and Applications
CityFukuoka
Period4/11/106/11/10
Other2010 International Conference on Broadband, Wireless Computing, Communication and Applications (04/11/2010-06/11/2010, Fukuoka)

Keywords

  • Cyber security

Fingerprint

Dive into the research topics of 'An analytical evaluation of network security modelling techniques applied to manage threats'. Together they form a unique fingerprint.

Cite this