메뉴 건너뛰기




Volumn 29, Issue 2, 2009, Pages 223-248

A comprehensive network security risk model for process control networks

Author keywords

Cyber attack modeling; Network security; Risk assessment

Indexed keywords

COMMODITY FLOWS; COUPLED PROBLEMS; CYBER ATTACK MODELING; ILLUSTRATIVE EXAMPLES; MANAGEMENT POLICIES; MODELING METHODOLOGIES; PROCESS CONTROL NETWORKS; RISK MODELS; SECURITY RISKS;

EID: 58849103145     PISSN: 02724332     EISSN: 15396924     Source Type: Journal    
DOI: 10.1111/j.1539-6924.2008.01151.x     Document Type: Review
Times cited : (30)

References (33)
  • 2
    • 0025914419 scopus 로고
    • Total risk management
    • Haimes YY. Total risk management. Risk Analysis, 1991 11 : 169 171.
    • (1991) Risk Analysis , vol.11 , pp. 169-171
    • Haimes, Y.Y.1
  • 3
    • 84988504967 scopus 로고    scopus 로고
    • A graph-based system for network-vulnerability analysis
    • Association for Computing Machinery
    • Phillips C, Swiler LP. A graph-based system for network-vulnerability analysis. In ACM Workshop on New Security Paradigms. Association for Computing Machinery, 1998.
    • (1998) In ACM Workshop on New Security Paradigms.
    • Phillips, C.1    Swiler, L.P.2
  • 8
    • 0036090498 scopus 로고    scopus 로고
    • Risk filtering, ranking, and management framework using hierarchical holographic modeling
    • Haimes YY, Kaplan S, Lambert JH. Risk filtering, ranking, and management framework using hierarchical holographic modeling. Risk Analysis, 2002 22 (2 383 398.
    • (2002) Risk Analysis , vol.22 , Issue.2 , pp. 383-398
    • Haimes, Y.Y.1    Kaplan, S.2    Lambert, J.H.3
  • 13
    • 0021208648 scopus 로고
    • A logarithmic poisson execution time model for software reliability measurement
    • Institute for Electrical and Electronics Engineers
    • Musa JD, Okumoto K. A logarithmic poisson execution time model for software reliability measurement. In IEEE International Conference on Software Engineering. Institute for Electrical and Electronics Engineers, 1984.
    • (1984) In IEEE International Conference on Software Engineering.
    • Musa, J.D.1    Okumoto, K.2
  • 14
    • 0025135323 scopus 로고
    • Application of software reliability modeling to product quality and test process
    • Institute for Electrical and Electronics Engineers
    • Ehrlich WK, Stampfel JP, Wu JR. Application of software reliability modeling to product quality and test process. In IEEE International Conference on Software Engineering. Institute for Electrical and Electronics Engineers, 1990.
    • (1990) In IEEE International Conference on Software Engineering.
    • Ehrlich, W.K.1    Stampfel, J.P.2    Wu, J.R.3
  • 20
    • 0019540987 scopus 로고
    • On the quantitative definition of risk
    • Kaplan S, Garrick BJ. On the quantitative definition of risk. Risk Analysis, 1981 1 : 11 27.
    • (1981) Risk Analysis , vol.1 , pp. 11-27
    • Kaplan, S.1    Garrick, B.J.2
  • 22
    • 13444304425 scopus 로고    scopus 로고
    • Adaptive two-player hierarchical holographic modeling game for counterterrorism intelligence analysis
    • Haimes YY, Horowitz BM. Adaptive two-player hierarchical holographic modeling game for counterterrorism intelligence analysis. Journal of Homeland Security and Emergency Management, 2004 1 (3).
    • (2004) Journal of Homeland Security and Emergency Management , vol.1 , Issue.3
    • Haimes, Y.Y.1    Horowitz, B.M.2
  • 24
    • 1542288809 scopus 로고    scopus 로고
    • A game theoretic approach to decision and analysis in network intrusion detection
    • Institute for Electrical and Electronics Engineers
    • Alpcan T, Basar T. A game theoretic approach to decision and analysis in network intrusion detection. In IEEE Conference on Decision and Control (CDC03). Institute for Electrical and Electronics Engineers, 2003.
    • (2003) In IEEE Conference on Decision and Control (CDC03).
    • Alpcan, T.1    Basar, T.2
  • 25
    • 14344257107 scopus 로고    scopus 로고
    • A game theoretic analysis of intrusion detection in access control systems
    • Institute for Electrical and Electronics Engineers
    • Alpcan T, Basar T. A game theoretic analysis of intrusion detection in access control systems. In IEEE Conference on Decision and Control (CDC04). Institute for Electrical and Electronics Engineers, 2004.
    • (2004) In IEEE Conference on Decision and Control (CDC04).
    • Alpcan, T.1    Basar, T.2
  • 30
    • 0021371504 scopus 로고
    • The partitioned multiobjective risk method
    • Asbeck E, Haimes YY. The partitioned multiobjective risk method. Large Scale Systems, 1984 6 (1 13 38.
    • (1984) Large Scale Systems , vol.6 , Issue.1 , pp. 13-38
    • Asbeck, E.1    Haimes, Y.Y.2
  • 31
    • 21244494118 scopus 로고    scopus 로고
    • A roadmap for quantifying the efficacy of risk management of information security and interdependent scada systems
    • Haimes YY, Chittister CG. A roadmap for quantifying the efficacy of risk management of information security and interdependent scada systems. Journal of Homeland Security and Emergency Management, 2005 2 (2).
    • (2005) Journal of Homeland Security and Emergency Management , vol.2 , Issue.2
    • Haimes, Y.Y.1    Chittister, C.G.2
  • 32
    • 0035281847 scopus 로고    scopus 로고
    • Leontief-based model for risk in complex interconnected infrastructures
    • Haimes YY, Jiang P. Leontief-based model for risk in complex interconnected infrastructures. ASCE Journal of Infrastructure Systems, 2001 7 (1 1 12.
    • (2001) ASCE Journal of Infrastructure Systems , vol.7 , Issue.1 , pp. 1-12
    • Haimes, Y.Y.1    Jiang, P.2
  • 33
    • 8844234423 scopus 로고    scopus 로고
    • Modeling the demand reduction input-output inoperability due to terrorism of interconnected infrastructures
    • Santos JR, Haimes YY. Modeling the demand reduction input-output inoperability due to terrorism of interconnected infrastructures. Risk Analysis, 2004 24 (6 1437 1451.
    • (2004) Risk Analysis , vol.24 , Issue.6 , pp. 1437-1451
    • Santos, J.R.1    Haimes, Y.Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.