메뉴 건너뛰기




Volumn , Issue , 2013, Pages 429-432

Security analysis on cyber-physical system using attack tree

Author keywords

attack tree; CPS risk assessment; threat; vunerability

Indexed keywords

EMBEDDED SYSTEMS; FORESTRY; MULTIMEDIA SIGNAL PROCESSING; NETWORK LAYERS;

EID: 84904467113     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IIH-MSP.2013.113     Document Type: Conference Paper
Times cited : (25)

References (8)
  • 1
    • 58049120863 scopus 로고
    • A system security engineering process
    • Washington D. C. , USA,. )
    • J. D. Weiss, "A system security engineering process, " Proc. 14th Nat. Comp. Sec. Conf. , Washington D. C. , USA, 1991. )
    • (1991) Proc. 14th Nat. Comp. Sec. Conf.
    • Weiss, J.D.1
  • 3
    • 34047240072 scopus 로고    scopus 로고
    • The use of attack trees in assessing vulnerabilities in scada systems
    • Lisbon, Portugal
    • E. Byres, M. Franz, D. Miller, The Use of Attack Trees in Assessing Vulnerabilities in SCADA Systems, Proc. IISW'04, Lisbon, Portugal, 2004. .
    • (2004) Proc. IISW'04
    • Byres, E.1    Franz, M.2    Miller, D.3
  • 4
    • 54949112031 scopus 로고    scopus 로고
    • Quantitativelyassessing the vulnerability of critical information systems a new method for evaluating security enhancements
    • S. Patel, J. Graham, and P. Ralston, "Quantitativelyassessing the vulnerability of critical information systems A new method for evaluating security enhancements, " Int. J. of Information Management, Vol. 28, pp. 483-491, 2008.
    • (2008) Int. J. of Information Management , vol.28 , pp. 483-491
    • Patel, S.1    Graham, J.2    Ralston, P.3
  • 5
    • 42549101645 scopus 로고    scopus 로고
    • Govindarasu, vulnerability assessment of cybersecurity for scadasystems using attack trees
    • C.-W. Ten, C.-C. Liu and M. Govindarasu, Vulnerability Assessment of Cybersecurity for SCADASystems Using Attack Trees, IEEE PES General Meeting, USA, 2007, pp. 1-8. .
    • (2007) IEEE PES General Meeting, USA , pp. 1-8
    • Ten, C.-W.1    Liu, M.C.-C.2
  • 7
    • 85081821575 scopus 로고    scopus 로고
    • Attack trees Modeling security threats
    • Bruce Schneier
    • Bruce Schneier, Attack trees Modeling security threats. Dr. Dobb's Journal, December 1999
    • (1999) Dr. Dobb's Journal, December


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.