Probabilistic modeling and analysis of sequential cyber‐attacks

[1]  Tadashi Dohi,et al.  Estimating Software Rejuvenation Schedules in High-Assurance Systems , 2001, Comput. J..

[2]  Shamkant B. Navathe,et al.  Managing vulnerabilities of information systems to security incidents , 2003, ICEC '03.

[3]  Haibo He,et al.  Q-Learning-Based Vulnerability Analysis of Smart Grid Against Sequential Topology Attacks , 2017, IEEE Transactions on Information Forensics and Security.

[4]  Sicard Franck,et al.  From ICS Attacks' Analysis to the S.A.F.E. Approach: Implementation of Filters Based on Behavioral Models and Critical State Distance for ICS Cybersecurity , 2018, 2018 2nd Cyber Security in Networking Conference (CSNet).

[5]  Vipul Jain,et al.  Availability Analysis of Repairable Mechanical Systems Using Analytical Semi-Markov Approach , 2013 .

[6]  Yuan Liu,et al.  Network security risk assessment method based on HMM and attack graph model , 2016, 2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).

[7]  Chi-Chun Lo,et al.  A hybrid information security risk assessment procedure considering interdependences between controls , 2012, Expert Syst. Appl..

[8]  Shouhuai Xu,et al.  Cyber Epidemic Models with Dependences , 2015, Internet Math..

[9]  Kalle Lyytinen,et al.  Identifying Software Project Risks: An International Delphi Study , 2001, J. Manag. Inf. Syst..

[10]  Hui Xiong,et al.  VMRaS: A Novel Virtual Machine Risk Assessment Scheme in the Cloud Environment , 2013, 2013 IEEE International Conference on Services Computing.

[11]  Bashar Nuseibeh,et al.  Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing Domain , 2011, SEC.

[12]  Shamkant B. Navathe,et al.  A Management Perspective on Risk of Security Threats to Information Systems , 2005, Inf. Technol. Manag..

[13]  John Quigley,et al.  Sequential Refined Partitioning for Probabilistic Dependence Assessment , 2018, Risk analysis : an official publication of the Society for Risk Analysis.

[14]  Carsten Rudolph,et al.  A property based security risk analysis through weighted simulation , 2011, 2011 Information Security for South Africa.

[15]  Shouhuai Xu,et al.  Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization , 2017, Reliab. Eng. Syst. Saf..

[16]  Liudong Xing,et al.  Binary Decision Diagrams and Extensions for System Reliability Analysis: Xing/Binary , 2015 .

[17]  Lu-Xing Yang,et al.  A computer virus model with graded cure rates , 2013 .

[18]  Fuguo Deng,et al.  Improving the security of multiparty quantum secret sharing against Trojan horse attack , 2005, quant-ph/0506194.

[19]  Ahmad-Reza Sadeghi,et al.  State-aware anomaly detection for industrial control systems , 2018, SAC.

[20]  Wang Bin,et al.  Research the information security risk assessment technique based on Bayesian network , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[21]  Xiangyu Zhang,et al.  Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).

[22]  Jun Yan,et al.  Smart Grid Vulnerability under Cascade-Based Sequential Line-Switching Attacks , 2014, GLOBECOM 2014.

[23]  Zoya Pourmirza,et al.  Using Self-Organizing Architectures to Mitigate the Impacts of Denial-of-Service Attacks on Voltage Control Schemes , 2019, IEEE Transactions on Smart Grid.

[24]  Jie Wu,et al.  Modeling cascading failures in interdependent infrastructures under terrorist attacks , 2016, Reliab. Eng. Syst. Saf..

[25]  Mohamed Cheriet,et al.  Taxonomy of information security risk assessment (ISRA) , 2016, Comput. Secur..

[26]  Jean-Marie Flaus,et al.  An approach based on behavioral models and critical states distance notion for improving cybersecurity of industrial control systems , 2019, Reliab. Eng. Syst. Saf..

[27]  Ebenezer Paintsil Taxonomy of security risk assessment approaches for researchers , 2012, 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN).

[28]  Stefan Fenz,et al.  Ontology-Based Decision Support for Information Security Risk Management , 2009, 2009 Fourth International Conference on Systems.

[29]  Jeffrey P. Kharoufeh,et al.  Semi-Markov models for degradation-based reliability , 2010 .

[30]  Siba Sankar Mahapatra,et al.  Risk assessment in IT outsourcing using fuzzy decision-making approach: An Indian perspective , 2014, Expert Syst. Appl..

[31]  Franck Sicard,et al.  Process-Aware Model based IDSs for Industrial Control Systems Cybersecurity: Approaches, Limits and Further Research , 2018, 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA).

[32]  Liudong Xing,et al.  Exact combinatorial reliability analysis of dynamic systems with sequence-dependent failures , 2011, Reliab. Eng. Syst. Saf..

[33]  Richard Jehlen,et al.  NextGen flight security risk assessment information concept , 2009, 2009 IEEE/AIAA 28th Digital Avionics Systems Conference.

[34]  Hisham M. Haddad,et al.  A Methodological Tool for Asset Identification in Web Applications: Security Risk Assessment , 2009, 2009 Fourth International Conference on Software Engineering Advances.

[35]  Canqin Tang,et al.  Global exponential stability of nonresident computer virus models , 2017 .

[36]  Hao Zhang,et al.  Function-Oriented Information Assets Identification on Substation Automation Systems , 2009, 2009 Asia-Pacific Power and Energy Engineering Conference.

[37]  T. R. Dell,et al.  Quantifying Diameter Distributions with the Weibull Function , 1973 .

[38]  Marshall A. Kuypers,et al.  Cyber Risk Management for Critical Infrastructure: A Risk Analysis Model and Three Case Studies , 2018, Risk analysis : an official publication of the Society for Risk Analysis.

[39]  Vasilis Fthenakis,et al.  Hazard and operability (HAZOP) analysis. A literature review. , 2010, Journal of hazardous materials.

[40]  Rayford B. Vaughn,et al.  Information system security compliance to FISMA standard: a quantitative measure , 2010, Telecommun. Syst..

[41]  Agapios N. Platis,et al.  Semi-Markov performance modelling of a redundant system with partial, full and failed rejuvenation , 2010, Int. J. Crit. Comput. Based Syst..

[42]  Hany H. Ammar,et al.  A Methodology for Architecture-Level Reliability Risk Analysis , 2002, IEEE Trans. Software Eng..

[43]  Sachin Shetty,et al.  Security Risk Assessment of Cloud Carrier , 2013, 2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing.

[44]  Liudong Xing,et al.  Probabilistic Security Risk Assessment of Systems Subject to Sequential Attacks , 2018, 2018 12th International Conference on Reliability, Maintainability, and Safety (ICRMS).

[45]  I. Hogganvik,et al.  Model-based security analysis in seven steps — a guided tour to the CORAS method , 2007 .