{"title":"复杂事件响应计划定量分析的新算法","authors":"L. Ping, Haifeng Yu, Li Jin, Xu Boyi","doi":"10.1109/ICCIAUTOM.2011.6183952","DOIUrl":null,"url":null,"abstract":"In order to respond the information security incident, we must make plans of incident response. We also need to summarize and analyze the past incident response method so as to accumulating successful incident response experience. Two problems were studied in this paper. At first we present a method of decomposing and describing complex incident response plans. The action decomposing method is used to decompose the incident response method. The second is an algorithm of analyzing incident responses plans that based on the method of decomposing and describing complex incident responses plans.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"20 1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A new algorithm of quantitative analyzing complex incident response plan\",\"authors\":\"L. Ping, Haifeng Yu, Li Jin, Xu Boyi\",\"doi\":\"10.1109/ICCIAUTOM.2011.6183952\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In order to respond the information security incident, we must make plans of incident response. We also need to summarize and analyze the past incident response method so as to accumulating successful incident response experience. Two problems were studied in this paper. At first we present a method of decomposing and describing complex incident response plans. The action decomposing method is used to decompose the incident response method. The second is an algorithm of analyzing incident responses plans that based on the method of decomposing and describing complex incident responses plans.\",\"PeriodicalId\":177039,\"journal\":{\"name\":\"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)\",\"volume\":\"20 1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCIAUTOM.2011.6183952\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIAUTOM.2011.6183952","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A new algorithm of quantitative analyzing complex incident response plan
In order to respond the information security incident, we must make plans of incident response. We also need to summarize and analyze the past incident response method so as to accumulating successful incident response experience. Two problems were studied in this paper. At first we present a method of decomposing and describing complex incident response plans. The action decomposing method is used to decompose the incident response method. The second is an algorithm of analyzing incident responses plans that based on the method of decomposing and describing complex incident responses plans.