A Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and Malicious Attacks
碩士 === 國立臺灣大學 === 資訊管理學研究所 === 95 === Modern organizations have increasingly relied on information technology to facilitate daily business operations. However, the dependency is built upon an environment where hazardous events happen frequently and malicious attacks emerge in an endless stream. To a...
Main Authors: | Kun-Dao Jiang, 江坤道 |
---|---|
Other Authors: | 林永松 |
Format: | Others |
Language: | en_US |
Published: |
2007
|
Online Access: | http://ndltd.ncl.edu.tw/handle/27717984998726634904 |
Similar Items
-
Near Optimal Defense Resource Allocation and Information Dividing-and-Allocation Strategies to Minimize Information Leakage Considering both Random Errors and Malicious Attacks
by: Chih-Hao, Su, et al.
Published: (2008) -
Protecting agents against malicious host attacks
by: Abu-Bakar, Kamalrulnizam
Published: (2004) -
GNSS interference management techniques against malicious attacks
by: Casile, Roberta <1986>
Published: (2015) -
Maximization of Network Survivability against Intelligent and Malicious Attacks
by: Chien-Hung Chen, et al.
Published: (2005) -
Effective Network Planning and Defending Strategies to Minimize Attackers’ Success Probabilities under Malicious and Epidemic Attacks
by: Jia-ling Pan, et al.
Published: (2011)