Modern physical protection systems integrate a number of security systems (including procedures, equipments, and personnel) into a single interface to ensure an adequate level of protection of people and critical assets against malevolent human actions. Due to the critical functions of a protection system, the quantitative evaluation of its effectiveness is an important issue that still raises several challenges. In this paper we propose a model-driven approach to support the design and the evaluation of physical protection systems based on (a) UML models representing threats, protection facilities, assets, and relationships among them, and (b) the automatic construction of a Bayesian Network model to estimate the vulnerability of different...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
Vulnerability assessment is a crucial aspect for the development of methodologies to define the leve...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
Modern physical protection systems integrate a number of security systems (including procedures, equ...
AbstractThis paper discusses the use of model-based systems engineering (MBSE) models for physical p...
Vulnerability of railway physical assets against adversary’s attacks is affected by a number of fact...
The high level of interconnection and interdependency between critical infrastructures demands for n...
Security mechanisms are at the base of modern computer systems, demanded to be more and more reactiv...
The design of complex Physical Protection Systems (PPSs) still raises some challenges despite the hi...
There is continuing growth in the need to secure critical infrastructures from malicious adversaries...
Effective critical infrastructure protection requires methodologies and tools for the automated eval...
International audienceSecuring critical systems such as cyber physical systems (CPS) is an important...
A model of malicious intrusions in infrastructure facilities is developed, using a network represent...
The multifaceted nature of cyber-physical systems needs holistic study methods to detect essential a...
Chemical facilities may be targets of deliberate acts of interference triggering major accidents (fi...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
Vulnerability assessment is a crucial aspect for the development of methodologies to define the leve...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
Modern physical protection systems integrate a number of security systems (including procedures, equ...
AbstractThis paper discusses the use of model-based systems engineering (MBSE) models for physical p...
Vulnerability of railway physical assets against adversary’s attacks is affected by a number of fact...
The high level of interconnection and interdependency between critical infrastructures demands for n...
Security mechanisms are at the base of modern computer systems, demanded to be more and more reactiv...
The design of complex Physical Protection Systems (PPSs) still raises some challenges despite the hi...
There is continuing growth in the need to secure critical infrastructures from malicious adversaries...
Effective critical infrastructure protection requires methodologies and tools for the automated eval...
International audienceSecuring critical systems such as cyber physical systems (CPS) is an important...
A model of malicious intrusions in infrastructure facilities is developed, using a network represent...
The multifaceted nature of cyber-physical systems needs holistic study methods to detect essential a...
Chemical facilities may be targets of deliberate acts of interference triggering major accidents (fi...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
Vulnerability assessment is a crucial aspect for the development of methodologies to define the leve...
The paper presents the results of the development of a method for assessing the security of cyber-ph...