Cyber Risk in Industrial Control Systems
暂无分享,去创建一个
Jeffrey D. Gordon | Ryan M. Layer | J. Ryan Carr | Matthew H. Henry | David R. Zaret | J. Daniel Gordon | J. Carr | D. R. Zaret | M. Henry
[1] Chuei-Tin Chang,et al. Petri-Net models for risk analysis of hazardous liquid loading operations , 2002 .
[2] Mathias Ekstedt,et al. Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks , 2012, IEEE Transactions on Dependable and Secure Computing.
[3] Tadao Murata,et al. Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.
[4] Ole Martin Dahl,et al. Using Coloured Petri Nets in Penetration Testing , 2005 .
[5] Yacov Y Haimes,et al. A comprehensive Network Security Risk Model for process control networks. , 2009, Risk analysis : an official publication of the Society for Risk Analysis.
[6] Thomas Llansó,et al. CyMRisk: An approach for computing mission risk due to cyber attacks , 2014, 2014 IEEE International Systems Conference Proceedings.
[7] L. Shapley,et al. Stochastic Games* , 1953, Proceedings of the National Academy of Sciences.
[8] O. H. Brownlee,et al. ACTIVITY ANALYSIS OF PRODUCTION AND ALLOCATION , 1952 .
[9] Joel Veness,et al. Monte-Carlo Planning in Large POMDPs , 2010, NIPS.
[10] Richard Lippmann,et al. Modeling Modern Network Attacks and Countermeasures Using Attack Graphs , 2009, 2009 Annual Computer Security Applications Conference.
[11] Ulrich Berger,et al. Brown's original fictitious play , 2007, J. Econ. Theory.
[12] T. Basar,et al. A game theoretic approach to decision and analysis in network intrusion detection , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).
[13] William H. Sanders,et al. RRE: A Game-Theoretic Intrusion Response and Recovery Engine , 2014, IEEE Trans. Parallel Distributed Syst..
[14] Ryan M. Layer,et al. Evaluating the risk of cyber attacks on SCADA systems via Petri net analysis with application to hazardous liquid loading operations , 2009, 2009 IEEE Conference on Technologies for Homeland Security.
[15] Yacov Y. Haimes,et al. Robust multiobjective dynamic programming:Minimax envelopes for efficient decisionmaking under scenariouncertainty , 2009 .
[16] T. Basar,et al. A game theoretic analysis of intrusion detection in access control systems , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
[17] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[18] W. Lovejoy. A survey of algorithmic methods for partially observed Markov decision processes , 1991 .
[19] Paul Ammann,et al. A host-based approach to network attack chaining analysis , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[20] Sushil Jajodia,et al. Minimum-cost network hardening using attack graphs , 2006, Comput. Commun..
[21] Xia Wang,et al. Software fault tree and coloured Petri net-based specification, design and implementation of agent-based intrusion detection systems , 2007, Int. J. Inf. Comput. Secur..
[22] T. E. S. Raghavan,et al. Algorithms for stochastic games — A survey , 1991, ZOR Methods Model. Oper. Res..
[23] Wolfgang Reisig. Petri Nets: An Introduction , 1985, EATCS Monographs on Theoretical Computer Science.
[24] Jeannette M. Wing,et al. Game strategies in network security , 2005, International Journal of Information Security.
[25] James P. McDermott,et al. Attack net penetration testing , 2001, NSPW '00.
[26] Wei Chen,et al. Colored Petri Net Based Attack Modeling , 2003, RSFDGrC.
[27] Y. Haimes. Risk Modeling, Assessment, and Management: Haimes/Risk Modeling, Assessment 2e , 2005 .
[28] Alain Finkel,et al. The Minimal Coverability Graph for Petri Nets , 1991, Applications and Theory of Petri Nets.
[29] Ryan M. Layer,et al. Coupled Petri nets for computer network risk analysis , 2010, Int. J. Crit. Infrastructure Prot..
[30] Javier Esparza,et al. Decidability and Complexity of Petri Net Problems - An Introduction , 1996, Petri Nets.