Combined Safety and Security Risk Analysis using the Ufoi-E Method: A Case Study of an Autonomous Surface Vessel

[1]  T. Aven A unified framework for risk and vulnerability analysis covering both safety and security , 2011 .

[2]  Tor Arne Johansen,et al.  MPC-based Collision Avoidance Strategy for Existing Marine Vessel Guidance Systems , 2018, 2018 IEEE International Conference on Robotics and Automation (ICRA).

[3]  Ludovic Piètre-Cambacédès,et al.  Cross-fertilization between safety and security engineering , 2013, Reliab. Eng. Syst. Saf..

[4]  Tristan Perez,et al.  Ship Collision Avoidance and COLREGS Compliance Using Simulation-Based Control Behavior Selection With Predictive Hazard Assessment , 2016, IEEE Transactions on Intelligent Transportation Systems.

[5]  Insup Lee,et al.  Cyber-physical systems: The next computing revolution , 2010, Design Automation Conference.

[6]  Carl A. Gunter,et al.  Addressing Safety and Security Contradictions in Cyber-Physical Systems , 2009 .

[7]  Erik F. Wilthil,et al.  A Target Tracking System for ASV Collision Avoidance Based on the PDAF , 2017 .

[8]  Ludovic Piètre-Cambacédès,et al.  A survey of approaches combining safety and security for industrial control systems , 2015, Reliab. Eng. Syst. Saf..

[9]  Enrico Zio,et al.  The future of risk assessment , 2018, Reliab. Eng. Syst. Saf..

[10]  Marvin Rausand,et al.  Risk Assessment: Theory, Methods, and Applications , 2011 .

[11]  Mary Ann Lundteigen,et al.  Conceptualizing the key features of cyber‐physical systems in a multi‐layered representation for safety and security analysis , 2019, Syst. Eng..

[12]  Wolter Pieters,et al.  Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications , 2016, CRITIS.

[13]  Nancy G. Leveson,et al.  Engineering a Safer World: Systems Thinking Applied to Safety , 2012 .

[14]  Gerasimos Theotokatos,et al.  Vulnerabilities and safety assurance methods in Cyber-Physical Systems: A comprehensive review , 2019, Reliab. Eng. Syst. Saf..

[15]  Yuan Xue,et al.  Taxonomy for description of cross-domain attacks on CPS , 2013, HiCoNS '13.

[16]  Fengjun Li,et al.  Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.

[17]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.