“…(1) Threat analysis, especially for quantification of the threat, is a considerable challenge since it requires a multitude of data and knowledge, and modeling the motivations, intents, characteristics, capabilities, and tactics of adversaries (Baybutt, 2017;Paté-Cornell and Guikema, 2002). Vulnerability analysis requires a detailed understanding of the design and operation of installations and the threat information (Matteini et al, 2018;Moore et al, 2007;Staalduinen et al, 2016). Security measures can improve the capability of installations against attacks but also may change the attackers' strategies because of the intelligent character of the adversaries (Cox, 2009;Cox, 2008;Powell, 2007).…”