메뉴 건너뛰기




Volumn 6983 LNCS, Issue , 2013, Pages 128-139

Petri net modelling of physical vulnerability

Author keywords

Model Based Vulnerability Assessment; Physical Security; Risk Analysis; Stochastic Petri Nets

Indexed keywords

PHYSICAL SECURITY; PROBABILITY OF OCCURRENCE; PROBABILITY OF SUCCESS; QUANTITATIVE EVALUATION; SECURITY RISK EVALUATIONS; STOCHASTIC PETRI NETS; SYSTEM VULNERABILITY; VULNERABILITY ASSESSMENTS;

EID: 84885779641     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-41476-3_11     Document Type: Conference Paper
Times cited : (13)

References (20)
  • 5
    • 80052974180 scopus 로고    scopus 로고
    • Model-driven availability evaluation of railway control systems
    • Flammini, F., Bologna, S., Vittorini, V. (eds.) SAFECOMP 2011. Springer, Heidelberg
    • Bernardi, S., Flammini, F., Marrone, S., Merseguer, J., Papa, C., Vittorini, V.: Model-driven availability evaluation of railway control systems. In: Flammini, F., Bologna, S., Vittorini, V. (eds.) SAFECOMP 2011. LNCS, vol. 6894, pp. 15-28. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6894 , pp. 15-28
    • Bernardi, S.1    Flammini, F.2    Marrone, S.3    Merseguer, J.4    Papa, C.5    Vittorini, V.6
  • 7
    • 33847411543 scopus 로고    scopus 로고
    • A policy-based methodology for security evaluation: A security metric for public key infrastructures
    • Casola, V., Mazzeo, A., Mazzocca, N., Vittorini, V.: A policy-based methodology for security evaluation: A security metric for public key infrastructures. Journal of Computer Security 15(2), 197-229 (2007)
    • (2007) Journal of Computer Security , vol.15 , Issue.2 , pp. 197-229
    • Casola, V.1    Mazzeo, A.2    Mazzocca, N.3    Vittorini, V.4
  • 8
    • 23844470859 scopus 로고    scopus 로고
    • A reference model for security level evaluation: Policy and fuzzy techniques
    • Casola, V., Preziosi, R., Rak, M., Troiano, L.: A reference model for security level evaluation: Policy and fuzzy techniques. Journal of Universal Computer Science 11(1), 150-174 (2005)
    • (2005) Journal of Universal Computer Science , vol.11 , Issue.1 , pp. 150-174
    • Casola, V.1    Preziosi, R.2    Rak, M.3    Troiano, L.4
  • 9
    • 84885727452 scopus 로고    scopus 로고
    • Risk Steering Committee
    • Risk Steering Committee. DHS risk lexicon, http://www.dhs.gov/xlibrary/ assets/dhs-risk-lexicon.pdf
    • DHS Risk Lexicon
  • 10
    • 70349312712 scopus 로고    scopus 로고
    • Quantitative security risk assessment and management for railway transportation infrastructures
    • Setola, R., Geretshuber, S. (eds.) CRITIS 2008. Springer, Heidelberg
    • Flammini, F., Gaglione, A., Mazzocca, N., Pragliola, C.: Quantitative security risk assessment and management for railway transportation infrastructures. In: Setola, R., Geretshuber, S. (eds.) CRITIS 2008. LNCS, vol. 5508, pp. 180-189. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5508 , pp. 180-189
    • Flammini, F.1    Gaglione, A.2    Mazzocca, N.3    Pragliola, C.4
  • 13
    • 55349106566 scopus 로고    scopus 로고
    • Some limitations of risk = threat x vulnerability x consequence for risk analysis of terrorist attacks
    • Cox Jr., L.A.: Some limitations of risk = threat x vulnerability x consequence for risk analysis of terrorist attacks. Risk Analysis 28(6) (2008)
    • (2008) Risk Analysis , vol.28 , Issue.6
    • Cox Jr., L.A.1
  • 16
    • 12344298391 scopus 로고    scopus 로고
    • Modeling and simulating critical infrastructures and their interdependencies
    • IEEE Computer Society, Washington, DC
    • Rinaldi, S.M.: Modeling and simulating critical infrastructures and their interdependencies. In: Proceedings of the 37th HICSS 2004 - Track 2, vol. 2. IEEE Computer Society, Washington, DC (2004)
    • (2004) Proceedings of the 37th HICSS 2004 - Track 2 , vol.2
    • Rinaldi, S.M.1
  • 18
    • 77953148489 scopus 로고    scopus 로고
    • A framework for evaluating deployed security systems: Is there a chink in your armor?
    • Special Issue on Quantitative Risk Analysis Techniques for Security Applications
    • Taylor, M.E., Kiekintveld, C., Western, C., Tambe, M.: A framework for evaluating deployed security systems: Is there a chink in your armor? Informatica 34 (2010), Special Issue on Quantitative Risk Analysis Techniques for Security Applications
    • (2010) Informatica , vol.34
    • Taylor, M.E.1    Kiekintveld, C.2    Western, C.3    Tambe, M.4
  • 19
    • 68549104046 scopus 로고    scopus 로고
    • Physical security devices for computer subsystems: A survey of attacks and defenses
    • Paar, C., Koç, Ç.K. (eds.) CHES 2000. Springer, Heidelberg
    • Weingart, S.H.: Physical security devices for computer subsystems: A survey of attacks and defenses. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 302-317. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1965 , pp. 302-317
    • Weingart, S.H.1
  • 20
    • 84958773306 scopus 로고    scopus 로고
    • Petri net modelling and performability evaluation with timeNET 3.0
    • Haverkort, B.R., Bohnenkamp, H.C., Smith, C.U. (eds.) TOOLS 2000. Springer, Heidelberg
    • Zimmermann, A., Freiheit, J., German, R., Hommel, G.: Petri net modelling and performability evaluation with timeNET 3.0. In: Haverkort, B.R., Bohnenkamp, H.C., Smith, C.U. (eds.) TOOLS 2000. LNCS, vol. 1786, pp. 188-202. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1786 , pp. 188-202
    • Zimmermann, A.1    Freiheit, J.2    German, R.3    Hommel, G.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.