An efficient process to reduce infrastructure vulnerabilities facing malevolence
暂无分享,去创建一个
[1] T. Saaty,et al. The Analytic Hierarchy Process , 1985 .
[2] James V. Hansen,et al. Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection , 2007, Decis. Support Syst..
[3] Bertrand Munier,et al. Choix multicritères dans le risque et variables multidimensionnelles: proposition de méthode et application aux réseaux de transport d'énergie , 1999, RAIRO Oper. Res..
[4] Pierre Perilhon. MOSAR - Présentation de la méthode , 2015, Sécurité et gestion des risques.
[5] John C. McDonald,et al. Confronting the risks of terrorism: making the right decisions , 2004, Reliab. Eng. Syst. Saf..
[6] T. Ross. Fuzzy Logic with Engineering Applications , 1994 .
[7] Wolfgang Kröger,et al. Critical infrastructures at risk: A need for a new conceptual approach and extended analytical tools , 2008, Reliab. Eng. Syst. Saf..
[8] John Darby. Evaluation of Terrorist Risk Using Belief and Plausibility (PSAM-0384) , 2006 .
[9] Kathryn B. Laskey,et al. An Application of Bayesian Networks to Antiterrorism Risk Management for Military Planners , 2005 .
[10] Brian Randell,et al. Software dependability: a personal view , 1995 .
[11] Christopher A. Dieckmann,et al. Robust Decision Making , 2010 .
[12] J-C. Laprie,et al. DEPENDABLE COMPUTING AND FAULT TOLERANCE : CONCEPTS AND TERMINOLOGY , 1995, Twenty-Fifth International Symposium on Fault-Tolerant Computing, 1995, ' Highlights from Twenty-Five Years'..
[13] L. Branscomb. Protecting civil society from terrorism: the search for a sustainable strategy , 2004 .
[14] David Michaud,et al. Screening Vulnerabilities in Water-Supply Networks (PSAM-0250) , 2006 .
[15] Eric Chatelet,et al. Are safety and security in industrial systems antagonistic or complementary issues , 2008 .
[16] Raymond Aron,et al. Penser la guerre, Clausewitz , 1978 .
[17] Raymond Aron,et al. Clausewitz, philosopher of war , 1983 .
[18] David Michaud. Screening vulnerabilities in water supply networks : risk analysis of infrastructure systems , 2005 .
[19] Barry Charles Ezell,et al. Infrastructure Vulnerability Assessment Model (I‐VAM) , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[20] Wolfgang Kröger,et al. Risk assessment of regional systems , 2000, Reliab. Eng. Syst. Saf..
[21] George E. Apostolakis,et al. Bulk power risk analysis: Ranking infrastructure elements according to their risk significance , 2008 .
[22] Le Moigne,et al. La théorie du système général : théorie de la modélisation , 1984 .
[23] Nancy G. Leveson,et al. Integrated safety analysis of requirements specifications , 1997, Proceedings of ISRE '97: 3rd IEEE International Symposium on Requirements Engineering.