Search
نمایش تعداد 1-9 از 9
A Confidence-based Software Voter for Safety-Critical Systems
To tolerate software faults, N-Version Programming (NVP) and N-Modular Redundant (NMR) techniques are widely employed. In these techniques, N modules operate on the same data and send their outputs to a software voter. ...
Risk-based Intrusion Response Management in IDS using Bayesian Decision Networks
Nowadays, from information security perspective,
detection methods are not enough solely. Intrusion Detection and
Response Systems (IDRS), as a proactive solution, continuously
monitor system health ...
Network Security Risk Mitigation using Bayesian Decision Networks
Network security risk assessment and mitigation are two processes in the risk management framework which need to be done accurately to improve the overall security level of a network. In this paper, in order to increase ...
تحلیل سود- هزینهی ریسک امنیتی با استفاده از شبکههای تصمیم بیزی
تحلیل و کاهش ریسک امنیتی شبکههای کامپیوتری دو گام مهم در چارچوب مدیریت ریسک میباشد که در صورت دقت بالا در انجام آنها، سطح امنیت شبکه تا حد زیادی افزایش پیدا میکند. در این مقاله، با استفاده از شبکههای تصمیم بیزی به ...