全部文献期刊会议图书|学者科研项目
中外文文献  中文文献  外文文献
作者:H. Abdo , M. Kaouk , J.-M. Flaus ...
来源:[J].Computers & Security(IF 1.158), 2018, Vol.72, pp.175-195
摘要:... This approach combines bowtie analysis, commonly used for safety analysis, with a new extended version of attack tree analysis, introduced for security analysis of industrial control systems. The combined use of bowtie and attack tree provides an exhaustive representation of ...
作者:Florian Kammüller
来源:[J].Computers & Security(IF 1.158), 2019, Vol.87
摘要:Abstract(#br)In this paper, we present a proof calculus for Attack Trees and how its application to Quantum Cryptography is made possible by extending the framework to probabilistic reasoning on attacks. Attack trees are a well established and useful model for the construction of...
作者:Wenli Shang , Tianyu Gong , Chunyu Chen ...
来源:[J].Security and Communication Networks(IF 0.311), 2019, Vol.2019
摘要:... For effectively dealing with problem that the uncertainty and quantification difficulties are caused by subjective and objective factors in the assessment process, an information security risk assessment method based on attack tree model with fuzzy set theory and probability ...
作者:Ahto Buldas , Olga Gadyatskaya , Aleksandr Lenin ...
来源:[J].Computers & Security(IF 1.158), 2020, Vol.88
摘要:Abstract(#br)Attack trees are considered a useful tool for security modelling because they support qualitative as well as quantitative analysis. The quantitative approach is based on values associated to each node in the tree, expressing, for instance, the minimal cost or probabi...
作者:Peng Li , Chao Xu , Long Chen ...
来源:[J].International Journal of Distributed Sensor Networks, 2015, Vol.11
摘要:... This paper proposes an extended attack tree (EAT) model to identify RFID system's flaws and vulnerabilities. A corresponding formal description of the model is described which adds a probability SAND node together with the probability attribute of the node attack. In addition...
作者:John N. Whitley , Raphael C.-W. Phan , Jie Wang ...
来源:[J].Computers and Electrical Engineering(IF 0.928), 2011, Vol.37 (4), pp.624-628
摘要:Abstract(#br)An attack tree is a useful analytical technique to model security threats and/or risks, and hence model attacks as actual realizations of the former. Research on attack trees have focused either on applying such trees to model various ranges of security systems, or o...
作者:Ren Qiujie , Pan Gang , Bai Yongqiang ...
来源:[J].Dianzi Jishu Yingyong, 2018, Vol.44 (8), pp.113-117
摘要:In order to improve the accuracy and serviceability of information system security risk assessment and reduce the impact of subjective factors in risk assessment, based on fuzzy analytic hierarchy process and attack tree model, the security risk of information system is evaluated...
作者:Ronald R. Yager
来源:[J].Information Sciences(IF 3.643), 2005, Vol.176 (20), pp.2933-2959
摘要:Abstract(#br)We introduce the idea of an OWA node as an extension of the “and/or” node and use them to generalize “and/or” trees to OWA trees. We provide a semantics for an OWA node. Specifically while an “or” node requires only one of the children to be satisfied a...
作者:Wenli Shang , Tianyu Gong , Chunyu Chen ...
来源:[J].Security and Communication Networks(IF 0.311), 2019, Vol.2019
摘要:... For effectively dealing with problem that the uncertainty and quantification difficulties are caused by subjective and objective factors in the assessment process, an information security risk assessment method based on attack tree model with fuzzy set theory and probability ...
作者:Peng Li , Chao Xu , Long Chen ...
来源:[J].International Journal of Distributed Sensor Networks(IF 0.727), 2015, Vol.2015
摘要:... This paper proposes an extended attack tree (EAT) model to identify RFID system’s flaws and vulnerabilities. A corresponding formal description of the model is described which adds a probability SAND node together with the probability attribute of the node attack. In addit...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×