A Fuzzy Probability Bayesian Network Approach for Dynamic Cybersecurity Risk Assessment in Industrial Control Systems
暂无分享,去创建一个
Naixue Xiong | Chunjie Zhou | Yuanqing Qin | Bowen Hu | Yu-Chu Tian | Qi Zhang | Yu-Chu Tian | N. Xiong | Chunjie Zhou | Yuanqing Qin | Bowen Hu | Qi Zhang
[1] Naixue Xiong,et al. Multimodel-Based Incident Prediction and Risk Assessment in Dynamic Cybersecurity Protection for Industrial Control Systems , 2016, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[2] Davide Bresolin,et al. A Platform-Based Design Methodology With Contracts and Related Tools for the Design of Cyber-Physical Systems , 2015, Proceedings of the IEEE.
[3] Michael I. Jordan,et al. Loopy Belief Propagation for Approximate Inference: An Empirical Study , 1999, UAI.
[4] Rami Zwick,et al. Measures of similarity among fuzzy concepts: A comparative analysis , 1987, Int. J. Approx. Reason..
[5] Dale C. Rowe,et al. A survey SCADA of and critical infrastructure incidents , 2012, RIIT '12.
[6] Salwani Abdullah,et al. ANTSC: An Intelligent Naïve Bayesian Probabilistic Estimation Practice for Traffic Flow to Form Stable Clustering in VANET , 2018, IEEE Access.
[7] Przemyslaw Grzegorzewski,et al. Distances between intuitionistic fuzzy sets and/or interval-valued fuzzy sets based on the Hausdorff metric , 2004, Fuzzy Sets Syst..
[8] V. Vittal,et al. Online Risk-Based Security Assessment , 2002, IEEE Power Engineering Review.
[9] David J. Spiegelhalter,et al. Local computations with probabilities on graphical structures and their application to expert systems , 1990 .
[10] Indrajit Ray,et al. Dynamic Security Risk Management Using Bayesian Attack Graphs , 2012, IEEE Transactions on Dependable and Secure Computing.
[11] Zahir Tari,et al. A Probabilistic Model to Predict the Survivability of SCADA Systems , 2013, IEEE Transactions on Industrial Informatics.
[12] Adnan Darwiche,et al. Recursive conditioning , 2001, Artif. Intell..
[13] Carol Woody,et al. Introduction to the OCTAVE ® Approach , 2003 .
[14] Lei Huang,et al. Bayesian Networks in Fault Diagnosis , 2017, IEEE Transactions on Industrial Informatics.
[15] Joe Halliwell. Linguistic Probability Theory , 2008 .
[16] UpdatingRobert Mateescu,et al. Partition-based Anytime Approximation for Belief , 2001 .
[17] John W. Fisher,et al. Loopy Belief Propagation: Convergence and Effects of Message Errors , 2005, J. Mach. Learn. Res..
[18] Helen Gill,et al. Cyber-Physical Systems , 2019, 2019 IEEE International Conference on Mechatronics (ICM).
[19] S. E. Ahmed,et al. Markov Chain Monte Carlo: Stochastic Simulation for Bayesian Inference , 2008, Technometrics.
[20] Sabina Jeschke,et al. Security and Privacy in Cyber-Physical Systems : Foundations, Principles, and Applications , 2017 .
[21] Hao Wang,et al. Application of Work Domain Analysis for Cybersecurity , 2017, HCI.
[22] A. Salmerón,et al. Importance sampling in Bayesian networks using probability trees , 2000 .
[23] Gang Tao,et al. Relative Degrees and Adaptive Feedback Linearization Control of T–S Fuzzy Systems , 2015, IEEE Transactions on Fuzzy Systems.
[24] F. Cozman,et al. Generalizing variable elimination in Bayesian networks , 2000 .
[25] Konrad S. Wrona,et al. Real-time automated risk assessment in protected core networking , 2010, Telecommun. Syst..
[26] Ian Jenkinson,et al. An Offshore Risk Analysis Method Using Fuzzy Bayesian Network , 2009 .
[27] Richard Gowland,et al. The accidental risk assessment methodology for industries (ARAMIS)/layer of protection analysis (LOPA) methodology: a step forward towards convergent practices in risk assessment? , 2006, Journal of hazardous materials.
[28] Nir Friedman,et al. Bayesian Network Classifiers , 1997, Machine Learning.
[29] Lawrence J. Trautman,et al. Industrial Cyber Vulnerabilities: Lessons from Stuxnet and the Internet of Things , 2017 .
[30] Yafeng Yin,et al. Privacy-Preserving Transportation Traffic Measurement in Intelligent Cyber-physical Road Systems , 2016, IEEE Transactions on Vehicular Technology.
[31] Alvaro A. Cárdenas,et al. Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.
[32] E. Newport,et al. Computation of Conditional Probability Statistics by 8-Month-Old Infants , 1998 .
[33] Qiang Shen,et al. Linguistic probabilities: theory and application , 2008, Soft Comput..
[34] Bir Bhanu,et al. Dynamic Bayesian Networks for Vehicle Classification in Video , 2012, IEEE Transactions on Industrial Informatics.