메뉴 건너뛰기




Volumn , Issue , 2016, Pages 693-698

Attack-defense trees based cyber security analysis for CPSs

Author keywords

attack defense tree; CPS; cyber security; threat risk assessment

Indexed keywords

ARTIFICIAL INTELLIGENCE; COSTS; EMBEDDED SYSTEMS; FORESTRY; RISK ANALYSIS; RISKS; SCADA SYSTEMS; SOFTWARE ENGINEERING;

EID: 84983356303     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SNPD.2016.7515980     Document Type: Conference Paper
Times cited : (37)

References (15)
  • 1
    • 84864293887 scopus 로고    scopus 로고
    • Attack countermeasure trees (act): Towards unifying the constructs of attack and defense trees[J]
    • Roy A, Dong S K, Trivedi K S. Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees[J]. Security & Communication Networks, 2012, 5(8):929-943.
    • (2012) Security & Communication Networks , vol.5 , Issue.8 , pp. 929-943
    • Roy, A.1    Dong, S.K.2    Trivedi, K.S.3
  • 2
    • 78650758022 scopus 로고    scopus 로고
    • Attack-defense trees and two-player binary zero-sum extensive form games are equivalent[M]
    • Springer Berlin Heidelberg
    • Kordy B, Mauw S, Melissen M, et al. Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent[M]//Decision and Game Theory for Security. Springer Berlin Heidelberg, 2010:245-256.
    • (2010) Decision and Game Theory for Security , pp. 245-256
    • Kordy, B.1    Mauw, S.2    Melissen, M.3
  • 4
    • 33745849657 scopus 로고    scopus 로고
    • Foundations of attack trees
    • In Won, D., Kim, S., eds. Springer
    • Mauw, S., Oostdijk, M.: Foundations of Attack Trees. In Won, D., Kim, S., eds.:ICISC. Volume 3935 of LNCS., Springer (2005) 186-198
    • (2005) ICISC. Volume 3935 of LNCS , pp. 186-198
    • Mauw, S.1    Oostdijk, M.2
  • 5
  • 6
    • 70349191922 scopus 로고    scopus 로고
    • Using attack and protection trees to analyze threats and defenses to homeland security
    • K. S. Edge, G.C. Dalton II, R.A., Raines, R.F., Mills, " Using Attack and Protection Trees to Analyze Threats and Defenses to Homeland Security" MILCOM 2007, pp. 1-7, 2007
    • (2007) MILCOM , vol.2007 , pp. 1-7
    • Edge, K.S.1    Dalton, I.I.G.C.2    Raines, R.A.3    Mills, R.F.4
  • 7
    • 84882769942 scopus 로고    scopus 로고
    • Adtool: Security analysis with attack-defense trees[J]
    • Kordy B, Kordy P, Mauw S, et al. ADTool: Security Analysis with Attack-Defense Trees[J]. Lecture Notes in Computer Science, 2013, 8054:173-176.
    • (2013) Lecture Notes in Computer Science , vol.8054 , pp. 173-176
    • Kordy, B.1    Kordy, P.2    Mauw, S.3
  • 10
    • 84983309621 scopus 로고    scopus 로고
    • Fundamentals of computer security technology prentice-hall international[C]
    • Amoroso B E G. Fundamentals of computer security technology, Prentice-Hall International[C]//Stanford Persuasive Technology Lab. 2010.
    • (2010) Stanford Persuasive Technology Lab
    • Amoroso, B.E.G.1
  • 11
    • 0002670359 scopus 로고    scopus 로고
    • Attack tree s: Modelling security threats. Dr
    • December
    • B. Schneier. Attack tree s: Modelling security threats. Dr. Dobb's journal, December 1999.
    • (1999) Dobb's Journal
    • Schneier, B.1
  • 13
    • 58049131771 scopus 로고    scopus 로고
    • A framework for analyzing and mitigating the vulnerabilities of complex systems via attack and protection trees[J]
    • Edge K S. A Framework For Analyzing And Mitigating The Vulnerabilities Of Complex Systems Via Attack And Protection Trees[J]. Dissertations & Theses-Gradworks, 2007.
    • (2007) Dissertations & Theses-Gradworks
    • Edge, K.S.1
  • 15
    • 77955698013 scopus 로고    scopus 로고
    • An experimental platform for assessing scad a vulnerabilities and countermeasures in power plants[C]
    • Fovino I N, Masera M, Guidi L, et al. An experimental platform for assessing SCAD A vulnerabilities and countermeasures in power plants[C]//Human System Interactions (HSI), 2010 3rd Conference on. 2010:679-686.
    • (2010) Human System Interactions (HSI) 2010 3rd Conference on , pp. 679-686
    • Fovino, I.N.1    Masera, M.2    Guidi, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.