Association Analysis-Based Cybersecurity Risk Assessment for Industrial Control Systems
暂无分享,去创建一个
Chunjie Zhou | Yuanqing Qin | Yu-Chu Tian | Yuan Peng | Kaixing Huang | Yu-Chu Tian | Chunjie Zhou | Yuanqing Qin | Kaixing Huang | Yuan Peng
[1] Naixue Xiong,et al. A Fuzzy Probability Bayesian Network Approach for Dynamic Cybersecurity Risk Assessment in Industrial Control Systems , 2018, IEEE Transactions on Industrial Informatics.
[2] Victor I. Chang,et al. Neutrosophic Association Rule Mining Algorithm for Big Data Analysis , 2018, Symmetry.
[3] Chunjie Zhou,et al. Application of Bayesian network to data-driven cyber-security risk assessment in SCADA networks , 2017, 2017 27th International Telecommunication Networks and Applications Conference (ITNAC).
[4] Murat Aydos,et al. Assessing risks and threats with layered approach to Internet of Things security , 2019, Measurement and Control.
[5] Kevin Jones,et al. A review of cyber security risk assessment methods for SCADA systems , 2016, Comput. Secur..
[6] Gyunyoung Heo,et al. Cyber Security Risk Evaluation of a Nuclear I&C Using BN and ET , 2017 .
[7] Daniele Miorandi,et al. A risk assessment methodology for the Internet of Things , 2018, Comput. Commun..
[8] Maria L. Rizzo,et al. Brownian distance covariance , 2009, 1010.0297.
[9] Karl Henrik Johansson,et al. Secure Control Systems: A Quantitative Risk Management Approach , 2015, IEEE Control Systems.
[10] Qiang Meng,et al. Uncertainty Propagation in Quantitative Risk Assessment Modeling for Fire in Road Tunnels , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[11] Sadie Creese,et al. Security Risk Assessment in Internet of Things Systems , 2017, IT Professional.
[12] Karen Scarfone,et al. Common Vulnerability Scoring System , 2006, IEEE Security & Privacy.
[13] Badrul H. Chowdhury,et al. Power distribution system fault cause analysis by using association rule mining , 2017 .
[14] Lawrence J. Trautman,et al. Industrial Cyber Vulnerabilities: Lessons from Stuxnet and the Internet of Things , 2017 .
[15] S. Kaplan,et al. On The Quantitative Definition of Risk , 1981 .
[16] Karen A. Scarfone,et al. Guide to Industrial Control Systems (ICS) Security , 2015 .
[17] Jeffrey L. Hieb,et al. Cyber security risk assessment for SCADA and DCS networks. , 2007, ISA transactions.
[18] W. Aspinall,et al. Developing an Event Tree for probabilistic hazard and risk assessment at Vesuvius , 2008 .
[19] Huijun Gao,et al. Data-Based Techniques Focused on Modern Industry: An Overview , 2015, IEEE Transactions on Industrial Electronics.
[20] Yan Wei,et al. Network security risk assessment based on association rules , 2009, 2009 4th International Conference on Computer Science & Education.
[21] Chunjie Zhou,et al. A Model-Data Integrated Cyber Security Risk Assessment Method for Industrial Control Systems , 2018, 2018 IEEE 7th Data Driven Control and Learning Systems Conference (DDCLS).
[22] Lingfeng Wang,et al. Reliability analysis of power grids with cyber vulnerability in SCADA system , 2014, 2014 IEEE PES General Meeting | Conference & Exposition.
[23] Lingfeng Wang,et al. Power System Reliability Evaluation With SCADA Cybersecurity Considerations , 2015, IEEE Transactions on Smart Grid.
[24] Maria L. Rizzo,et al. Measuring and testing dependence by correlation of distances , 2007, 0803.4101.
[25] Jirachai Buddhakulsomsiri,et al. Application of association rule algorithm to industrial safety data mining , 2015 .
[26] Naixue Xiong,et al. Asset-Based Dynamic Impact Assessment of Cyberattacks for Risk Analysis in Industrial Control Systems , 2018, IEEE Transactions on Industrial Informatics.