Information security risk assessment for industrial control system is usually influenced by uncertain factors. For effectively dealing with problem that the uncertainty and quantification difficulties are caused by subjective and objective factors in the assessment process, an information security risk assessment method based on attack tree model with fuzzy set theory and probability risk assessment technology is proposed, which is applied in a risk scenario of ship control system. Firstly, potential risks of the control system are analyzed and the attack tree model is established. Then triangular fuzzy numbers and expert knowledge are used to determine the factors that influence the probability of a leaf node and the leaf nodes are quantif...
Aimed at the uncertainties and relevance issues during the risk factor identification in multicriter...
The increasing complexity in Military Command and Control (C2) systems has led to greater vulnerabil...
The article presents two approaches to information security risk modeling. The traditional probabili...
Information security risk assessment for industrial control system is usually influenced by uncertai...
A method based on improved fuzzy theory of evidence was presented to solve the problem that there ex...
The creation of a fuzzy model for the assessment of information security risks using computer mathem...
We suggested some methods for information security risk factors assessment. These methods are based ...
Several studies have proposed the concept of "fuzzy logic technique" to assess risk in information s...
Organizations use different types of information system to reach their goals. Decision makers are re...
Quantitative risk assessment and reliability are essential issues in modern safety to make reliable ...
Abstract—To address the problems of lack of training data and difficult to find optimal value in inf...
Warship’s air defense target threat assessment is an uncertainty issue. This paper briefly states th...
Quantitative security risk evaluation of information systems is increasingly drawing more and more a...
Quantitative risk assessment and reliability is most famous approach used for precise the values of ...
The features and world experience of information risk management are analyzed. The necessity of a co...
Aimed at the uncertainties and relevance issues during the risk factor identification in multicriter...
The increasing complexity in Military Command and Control (C2) systems has led to greater vulnerabil...
The article presents two approaches to information security risk modeling. The traditional probabili...
Information security risk assessment for industrial control system is usually influenced by uncertai...
A method based on improved fuzzy theory of evidence was presented to solve the problem that there ex...
The creation of a fuzzy model for the assessment of information security risks using computer mathem...
We suggested some methods for information security risk factors assessment. These methods are based ...
Several studies have proposed the concept of "fuzzy logic technique" to assess risk in information s...
Organizations use different types of information system to reach their goals. Decision makers are re...
Quantitative risk assessment and reliability are essential issues in modern safety to make reliable ...
Abstract—To address the problems of lack of training data and difficult to find optimal value in inf...
Warship’s air defense target threat assessment is an uncertainty issue. This paper briefly states th...
Quantitative security risk evaluation of information systems is increasingly drawing more and more a...
Quantitative risk assessment and reliability is most famous approach used for precise the values of ...
The features and world experience of information risk management are analyzed. The necessity of a co...
Aimed at the uncertainties and relevance issues during the risk factor identification in multicriter...
The increasing complexity in Military Command and Control (C2) systems has led to greater vulnerabil...
The article presents two approaches to information security risk modeling. The traditional probabili...