Control charting methods for autocorrelated cyber vulnerability data

dc.contributor.authorAfful‐Dadzie, A.
dc.contributor.authorAllen, T.T.
dc.date.accessioned2019-02-15T09:42:06Z
dc.date.available2019-02-15T09:42:06Z
dc.date.issued2016
dc.description.abstractControl charting cyber vulnerabilities is challenging because the same vulnerabilities can remain from period to period. Also, hosts (personal computers, servers, printers, etc.) are often scanned infrequently and can be unavailable during scanning. To address these challenges, control charting of the period-to-period demerits per host using a hybrid moving centerline residual-based and adjusted demerit (MCRAD) chart is proposed. The intent is to direct limited administrator resources to unusual cases when automatic patching is insufficient. The proposed chart is shown to offer superior average run length performance compared with three alternative methods from the literature. The methods are illustrated using three datasets.en_US
dc.identifier.citationAnthony Afful-Dadzie & Theodore T. Allen (2016) Control charting methods for autocorrelated cyber vulnerability data, Quality Engineering, 28:3, 313-328, DOI: 10.1080/08982112.2015.1125926en_US
dc.identifier.otherDOI: 10.1080/08982112.2015.1125926
dc.identifier.urihttp://ugspace.ug.edu.gh/handle/123456789/27549
dc.language.isoenen_US
dc.publisherTaylor and Francisen_US
dc.subjectautocorrelationen_US
dc.subjectaverage run length (ARL)en_US
dc.subjectcontrol chartsen_US
dc.subjectEWMA control chartsen_US
dc.subjectstatistical controlen_US
dc.titleControl charting methods for autocorrelated cyber vulnerability dataen_US
dc.typeArticleen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Control charting methods for autocorrelated cyber vulnerability data.pdf
Size:
922.01 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.6 KB
Format:
Item-specific license agreed upon to submission
Description: