I-SCRAM: A Framework for IoT Supply Chain Risk Analysis and Mitigation Decisions
暂无分享,去创建一个
[1] Quanyan Zhu,et al. Modeling and Assessment of IoT Supply Chain Security Risks: The Role of Structural and Parametric Uncertainties , 2020, 2020 IEEE Security and Privacy Workshops (SPW).
[2] Quanyan Zhu,et al. RIoTS: Risk Analysis of IoT Supply Chain Threats , 2020, 2020 IEEE 6th World Forum on Internet of Things (WF-IoT).
[3] Enrico Zio,et al. The evolution of system reliability optimization , 2019, Reliab. Eng. Syst. Saf..
[4] Yang Wei,et al. Supply Chain of Things: A Connected Solution to Enhance Supply Chain Productivity , 2019, IEEE Communications Magazine.
[5] Robert Lagerström,et al. Threat modeling - A systematic literature review , 2019, Comput. Secur..
[6] Karen Scarfone,et al. Considerations for managing Internet of Things (IoT) cybersecurity and privacy risks , 2018 .
[7] Gary B. Wills,et al. Towards Mapping the Security Challenges of the Internet of Things (IoT) Supply Chain , 2018, KES.
[8] Aleksandar Vakanski,et al. A secure architecture for IoT with supply chain risk management , 2017, 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).
[9] Chris Rose,et al. The Security Implications Of The Internet Of Things , 2017 .
[10] Nadya Bartol,et al. Supply Chain Risk Management Practices for Federal Information Systems and Organizations , 2015 .
[11] Marco Gribaudo,et al. Exploiting Bayesian Networks for the Analysis of Combined Attack Trees , 2015, PASM.
[12] Barbara Kordy,et al. DAG-based attack and defense modeling: Don't miss the forest for the attack trees , 2013, Comput. Sci. Rev..
[13] David A. Schmidt,et al. Aggregating vulnerability metrics in enterprise networks using attack graphs , 2013, J. Comput. Secur..
[14] Ronald S. Ross,et al. Guide for Conducting Risk Assessments , 2012 .
[15] Dong Seong Kim,et al. Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees , 2012, Secur. Commun. Networks.
[16] Nancy G. Leveson,et al. Engineering a Safer World: Systems Thinking Applied to Safety , 2012 .
[17] Indrajit Ray,et al. Dynamic Security Risk Management Using Bayesian Attack Graphs , 2012, IEEE Transactions on Dependable and Secure Computing.
[18] Vaidas Matuzas,et al. Analysis of large fault trees based on functional decomposition , 2011, Reliab. Eng. Syst. Saf..
[19] Daniele Sgandurra,et al. Hierarchical, model-based risk management of critical infrastructures , 2009, Reliab. Eng. Syst. Saf..
[20] Sushil Jajodia,et al. An Attack Graph-Based Probabilistic Security Metric , 2008, DBSec.
[21] Michael T. Todinov. 3 – METHODS FOR ANALYSIS OF COMPLEX RELIABILITY NETWORKS , 2007 .
[22] Michael Todinov,et al. Risk-Based Reliability Analysis and Generic Principles for Risk Reduction , 2006 .
[23] Xinming Ou,et al. A scalable approach to attack graph generation , 2006, CCS '06.
[24] Christopher S. Tang. Perspectives in supply chain risk management , 2006 .
[25] Sjouke Mauw,et al. Foundations of Attack Trees , 2005, ICISC.
[26] Somesh Jha,et al. Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[27] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[28] Edward G. Amoroso,et al. Fundamentals of computer security technology , 1994 .
[29] C. H. Lie,et al. Fault Tree Analysis, Methods, and Applications ߝ A Review , 1985, IEEE Transactions on Reliability.
[30] J. B. Fussell,et al. MOCUS: a computer program to obtain minimal sets from fault trees , 1974 .
[31] D. W. Goodall. A New Similarity Index Based on Probability , 1966 .