By Topic

Security Metrics Models and Application with SVM in Information Security Management

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Wei Qu ; Information Engineering School, University of Science and Technology Beijing, Beijing, 100083, China. E-MAIL: ; De-Zheng Zhang

In order to understand the achieved information security level in a product, system or organization better, information security managers must be able to get input from security objects. The use of information security metrics in certain enterprise, and its relation to the literature is studied. The techniques used in the implementation and analysis of metrics, as well as their usefulness and future targets are studied. Three standard models were proposed to get the numerical value for security level. The results of the models used in a manufacture factory with 6000 fellows show that there is an effective assessment to security system and great assistance to improve controlling information risk.

Published in:

2007 International Conference on Machine Learning and Cybernetics  (Volume:6 )

Date of Conference:

19-22 Aug. 2007