Model of Information Security Risk Assessment based on Improved Wavelet Neural Network

@article{Chen2013ModelOI,
  title={Model of Information Security Risk Assessment based on Improved Wavelet Neural Network},
  author={Gang Chen and Dawei Zhao},
  journal={J. Networks},
  year={2013},
  volume={8},
  pages={2093-2100}
}
This paper concentrates on the information security risk assessment model utilizing the improved wavelet neural network. The structure of wavelet neural network is similar to the multi-layer neural network, which is a feed-forward neural network with one or more inputs. Afterwards, we point out that the training process of wavelet neural networks is made up of four steps until the value of error function can satisfy a pre-defined error criteria. In order to enhance the quality of information… 

Figures and Tables from this paper

Information security risk analysis model using fuzzy decision theory

Application of a financial quantitative risk model to information security risk assessment

A novel ‘Malware’ VaR model is constructed to estimate the worst case financial loss due to malware based data exfiltration from an organisation and a novel approach to malware analysis using circular statistics and results of analysis using rose and helix diagrams are demonstrated.

fomgt multidimensional approach to information security risk anagement using FMEA and fuzzy theory

This paper presents an approach to information security risk management, encompassing Failure Mode and Effects isk management MEA uzzy theory Analysis (FMEA) and fuzzy theory, and shows that the most important aspects of information securityrisk are communication security, followed by infrastructure.

Expert systems for information security management and audit. Implementation phase issues

  • Maksat KanatovL. AtymtayevaB. Yagaliyeva
  • Computer Science
    2014 Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS) and 15th International Symposium on Advanced Intelligent Systems (ISIS)
  • 2014
The development of an application, which is based on international standards on information security and protection tools, is discussed, accompanied by web-based application module, which serves as an instrument for solving various security-related problems.

Digital security vulnerabilities and threats implications for financial institutions deploying digital technology platforms and application: FMEA and FTOPSIS analysis

This study conducted a step-by-step analysis of the potential vulnerabilities and threats affecting the integration of IoTs, Big Data Analytics, and Cloud Computing for data management and determined that insufficient use of backup electric generators, firewall protection failures, and no information security audits are high-ranking vulnerabilities and threat affecting integration.

References

SHOWING 1-10 OF 27 REFERENCES

Wavelet Fuzzy Neural Network based on MQPSO for Network Anomaly Detection

A novel network anomaly detection method employing wavelet fuzzy neural network (WFNN) to use modified Quantum-Behaved Particle Swarm Optimization (QPSO) and experimental result shows that this WFNN using the novel training algorithm has high detection rate while maintaining a low false positive rate.

Wavelet Fuzzy Neural Network Based on Modified QPSO for Network Anomaly Detection

A novel network anomaly detection method employing wavelet fuzzy neural network (WFNN) to use modified Quantum-Behaved Particle Swarm Optimization (QPSO) and experimental result shows that this WFNN using the novel training algorithm has high detection rate while maintaining a low false positive rate.

Intelligent system based on local linear wavelet neural network and recursive least square approach for breast cancer classification

Results on extracted breast cancer data from University of Wisconsin Hospital Madison show that the proposed approach to local linear wavelet neural network is very robust, effective and gives better classification.

Network Traffic Prediction Based on Neural Network

  • G. Feng
  • Computer Science
    2015 International Conference on Intelligent Transportation, Big Data and Smart City
  • 2015
The aim of this article is to explore a new network model in order to describe and predict the network character accurately and the results show the proposed scheme has good performance.

Information Security for Electric Power Utilities (EPUs)—CIGRÉ Developments on Frameworks, Risk Assessment, and Technology

  • G. Ericsson
  • Computer Science
    IEEE Transactions on Power Delivery
  • 2009
This paper deals with the important issue of proper treatment of information security for electric power utilities and gives guidance on different security frameworks based on an information security domain model based on a logical diagram using different controls.

A wavelet-neural network hybrid modelling approach for estimating and predicting river monthly flows

This approach integrates discrete wavelet multi-resolution decomposition and a back-propagation feed-forward multilayer perceptron (FFML) artificial neural network (ANN) to provide monthly river flow estimation and prediction.

A Wavelet Neural Networks License Recognition Algorithm and Its Application

Experimental results demonstrate that the proposed approach could efficiently be used as a vehicle license characters recognition system with high convergence, which is robust for license-size, license-color and background complexity.

An Information Systems Security Risk Assessment Model Under the Dempster-Shafer Theory of Belief Functions

This study develops an alternative methodology for the risk analysis of information systems security (ISS), an evidential reasoning approach under the Dempster-Shafer theory of belief functions that employs the belief function definition of risk--that is, ISS risk is the plausibility of ISS failures.