• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

使用Petri网的面向电子学习系统的威胁驱动建模框架。

Threat driven modeling framework using petri nets for e-learning system.

作者信息

Khamparia Aditya, Pandey Babita

机构信息

Department of Computer Science and Engineering, Lovely Professional University, Phagwara, Punjab India.

Department of Computer Applications, Lovely Professional University, Phagwara, India.

出版信息

Springerplus. 2016 Apr 14;5:446. doi: 10.1186/s40064-016-2101-0. eCollection 2016.

DOI:10.1186/s40064-016-2101-0
PMID:27119050
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC4830778/
Abstract

Vulnerabilities at various levels are main cause of security risks in e-learning system. This paper presents a modified threat driven modeling framework, to identify the threats after risk assessment which requires mitigation and how to mitigate those threats. To model those threat mitigations aspects oriented stochastic petri nets are used. This paper included security metrics based on vulnerabilities present in e-learning system. The Common Vulnerability Scoring System designed to provide a normalized method for rating vulnerabilities which will be used as basis in metric definitions and calculations. A case study has been also proposed which shows the need and feasibility of using aspect oriented stochastic petri net models for threat modeling which improves reliability, consistency and robustness of the e-learning system.

摘要

各个层面的漏洞是电子学习系统安全风险的主要原因。本文提出了一种改进的威胁驱动建模框架,用于在风险评估后识别需要缓解的威胁以及如何缓解这些威胁。为了对那些威胁缓解方面进行建模,使用了面向方面的随机Petri网。本文纳入了基于电子学习系统中存在的漏洞的安全指标。通用漏洞评分系统旨在提供一种对漏洞进行评级的标准化方法,该方法将用作指标定义和计算的基础。还提出了一个案例研究,该研究表明了使用面向方面的随机Petri网模型进行威胁建模的必要性和可行性,这提高了电子学习系统的可靠性、一致性和鲁棒性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6796/4830778/94341017dacb/40064_2016_2101_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6796/4830778/1ae285df9b0b/40064_2016_2101_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6796/4830778/90733eceafbc/40064_2016_2101_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6796/4830778/419200b5fc48/40064_2016_2101_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6796/4830778/6f62e78bfc38/40064_2016_2101_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6796/4830778/af1ec21744cc/40064_2016_2101_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6796/4830778/94341017dacb/40064_2016_2101_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6796/4830778/1ae285df9b0b/40064_2016_2101_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6796/4830778/90733eceafbc/40064_2016_2101_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6796/4830778/419200b5fc48/40064_2016_2101_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6796/4830778/6f62e78bfc38/40064_2016_2101_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6796/4830778/af1ec21744cc/40064_2016_2101_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6796/4830778/94341017dacb/40064_2016_2101_Fig6_HTML.jpg

相似文献

1
Threat driven modeling framework using petri nets for e-learning system.使用Petri网的面向电子学习系统的威胁驱动建模框架。
Springerplus. 2016 Apr 14;5:446. doi: 10.1186/s40064-016-2101-0. eCollection 2016.
2
Risk-driven security testing using risk analysis with threat modeling approach.使用风险分析和威胁建模方法进行风险驱动的安全测试。
Springerplus. 2014 Dec 19;3:754. doi: 10.1186/2193-1801-3-754. eCollection 2014.
3
Modeling Analysis of SM2 Construction Attacks in the Open Secure Sockets Layer Based on Petri Net.基于 Petri 网的开放安全套接字层中 SM2 构造攻击的建模分析。
Sensors (Basel). 2022 Feb 11;22(4):1398. doi: 10.3390/s22041398.
4
Multi-Source Knowledge Reasoning for Data-Driven IoT Security.用于数据驱动的物联网安全的多源知识推理
Sensors (Basel). 2021 Nov 15;21(22):7579. doi: 10.3390/s21227579.
5
Modeling and verification of authentication threats mitigation in aspect-oriented mal sequence woven model.面向方面的恶意序列编织模型中的认证威胁缓解的建模与验证。
PLoS One. 2022 Jul 6;17(7):e0270702. doi: 10.1371/journal.pone.0270702. eCollection 2022.
6
Constructing biological pathway models with hybrid functional petri nets.使用混合功能Petri网构建生物通路模型。
Stud Health Technol Inform. 2011;162:92-112.
7
Fuzzy multimodel of timed Petri nets.定时Petri网的模糊多模型
IEEE Trans Syst Man Cybern B Cybern. 2001;31(2):245-51. doi: 10.1109/3477.915347.
8
Fuzzy Petri Nets for Traffic Node Reliability.用于交通节点可靠性的模糊Petri网
Sensors (Basel). 2024 Sep 30;24(19):6337. doi: 10.3390/s24196337.
9
Constructing biological pathway models with hybrid functional Petri nets.使用混合功能Petri网构建生物途径模型。
In Silico Biol. 2004;4(3):271-91.
10
Adoption of Deep-Learning Models for Managing Threat in API Calls with Transparency Obligation Practice for Overall Resilience.采用深度学习模型来管理 API 调用中的威胁,同时履行透明度义务,以实现全面的弹性。
Sensors (Basel). 2024 Jul 26;24(15):4859. doi: 10.3390/s24154859.