Probabilistic modeling and analysis of sequential cyber‐attacks
暂无分享,去创建一个
[1] Tadashi Dohi,et al. Estimating Software Rejuvenation Schedules in High-Assurance Systems , 2001, Comput. J..
[2] Shamkant B. Navathe,et al. Managing vulnerabilities of information systems to security incidents , 2003, ICEC '03.
[3] Haibo He,et al. Q-Learning-Based Vulnerability Analysis of Smart Grid Against Sequential Topology Attacks , 2017, IEEE Transactions on Information Forensics and Security.
[4] Sicard Franck,et al. From ICS Attacks' Analysis to the S.A.F.E. Approach: Implementation of Filters Based on Behavioral Models and Critical State Distance for ICS Cybersecurity , 2018, 2018 2nd Cyber Security in Networking Conference (CSNet).
[5] Vipul Jain,et al. Availability Analysis of Repairable Mechanical Systems Using Analytical Semi-Markov Approach , 2013 .
[6] Yuan Liu,et al. Network security risk assessment method based on HMM and attack graph model , 2016, 2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).
[7] Chi-Chun Lo,et al. A hybrid information security risk assessment procedure considering interdependences between controls , 2012, Expert Syst. Appl..
[8] Shouhuai Xu,et al. Cyber Epidemic Models with Dependences , 2015, Internet Math..
[9] Kalle Lyytinen,et al. Identifying Software Project Risks: An International Delphi Study , 2001, J. Manag. Inf. Syst..
[10] Hui Xiong,et al. VMRaS: A Novel Virtual Machine Risk Assessment Scheme in the Cloud Environment , 2013, 2013 IEEE International Conference on Services Computing.
[11] Bashar Nuseibeh,et al. Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing Domain , 2011, SEC.
[12] Shamkant B. Navathe,et al. A Management Perspective on Risk of Security Threats to Information Systems , 2005, Inf. Technol. Manag..
[13] John Quigley,et al. Sequential Refined Partitioning for Probabilistic Dependence Assessment , 2018, Risk analysis : an official publication of the Society for Risk Analysis.
[14] Carsten Rudolph,et al. A property based security risk analysis through weighted simulation , 2011, 2011 Information Security for South Africa.
[15] Shouhuai Xu,et al. Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization , 2017, Reliab. Eng. Syst. Saf..
[16] Liudong Xing,et al. Binary Decision Diagrams and Extensions for System Reliability Analysis: Xing/Binary , 2015 .
[17] Lu-Xing Yang,et al. A computer virus model with graded cure rates , 2013 .
[18] Fuguo Deng,et al. Improving the security of multiparty quantum secret sharing against Trojan horse attack , 2005, quant-ph/0506194.
[19] Ahmad-Reza Sadeghi,et al. State-aware anomaly detection for industrial control systems , 2018, SAC.
[20] Wang Bin,et al. Research the information security risk assessment technique based on Bayesian network , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[21] Xiangyu Zhang,et al. Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[22] Jun Yan,et al. Smart Grid Vulnerability under Cascade-Based Sequential Line-Switching Attacks , 2014, GLOBECOM 2014.
[23] Zoya Pourmirza,et al. Using Self-Organizing Architectures to Mitigate the Impacts of Denial-of-Service Attacks on Voltage Control Schemes , 2019, IEEE Transactions on Smart Grid.
[24] Jie Wu,et al. Modeling cascading failures in interdependent infrastructures under terrorist attacks , 2016, Reliab. Eng. Syst. Saf..
[25] Mohamed Cheriet,et al. Taxonomy of information security risk assessment (ISRA) , 2016, Comput. Secur..
[26] Jean-Marie Flaus,et al. An approach based on behavioral models and critical states distance notion for improving cybersecurity of industrial control systems , 2019, Reliab. Eng. Syst. Saf..
[27] Ebenezer Paintsil. Taxonomy of security risk assessment approaches for researchers , 2012, 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN).
[28] Stefan Fenz,et al. Ontology-Based Decision Support for Information Security Risk Management , 2009, 2009 Fourth International Conference on Systems.
[29] Jeffrey P. Kharoufeh,et al. Semi-Markov models for degradation-based reliability , 2010 .
[30] Siba Sankar Mahapatra,et al. Risk assessment in IT outsourcing using fuzzy decision-making approach: An Indian perspective , 2014, Expert Syst. Appl..
[31] Franck Sicard,et al. Process-Aware Model based IDSs for Industrial Control Systems Cybersecurity: Approaches, Limits and Further Research , 2018, 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA).
[32] Liudong Xing,et al. Exact combinatorial reliability analysis of dynamic systems with sequence-dependent failures , 2011, Reliab. Eng. Syst. Saf..
[33] Richard Jehlen,et al. NextGen flight security risk assessment information concept , 2009, 2009 IEEE/AIAA 28th Digital Avionics Systems Conference.
[34] Hisham M. Haddad,et al. A Methodological Tool for Asset Identification in Web Applications: Security Risk Assessment , 2009, 2009 Fourth International Conference on Software Engineering Advances.
[35] Canqin Tang,et al. Global exponential stability of nonresident computer virus models , 2017 .
[36] Hao Zhang,et al. Function-Oriented Information Assets Identification on Substation Automation Systems , 2009, 2009 Asia-Pacific Power and Energy Engineering Conference.
[37] T. R. Dell,et al. Quantifying Diameter Distributions with the Weibull Function , 1973 .
[38] Marshall A. Kuypers,et al. Cyber Risk Management for Critical Infrastructure: A Risk Analysis Model and Three Case Studies , 2018, Risk analysis : an official publication of the Society for Risk Analysis.
[39] Vasilis Fthenakis,et al. Hazard and operability (HAZOP) analysis. A literature review. , 2010, Journal of hazardous materials.
[40] Rayford B. Vaughn,et al. Information system security compliance to FISMA standard: a quantitative measure , 2010, Telecommun. Syst..
[41] Agapios N. Platis,et al. Semi-Markov performance modelling of a redundant system with partial, full and failed rejuvenation , 2010, Int. J. Crit. Comput. Based Syst..
[42] Hany H. Ammar,et al. A Methodology for Architecture-Level Reliability Risk Analysis , 2002, IEEE Trans. Software Eng..
[43] Sachin Shetty,et al. Security Risk Assessment of Cloud Carrier , 2013, 2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing.
[44] Liudong Xing,et al. Probabilistic Security Risk Assessment of Systems Subject to Sequential Attacks , 2018, 2018 12th International Conference on Reliability, Maintainability, and Safety (ICRMS).
[45] I. Hogganvik,et al. Model-based security analysis in seven steps — a guided tour to the CORAS method , 2007 .