2019
DOI: 10.1016/j.ress.2018.03.001
|View full text |Cite
|
Sign up to set email alerts
|

A comparative analysis of security risk assessment methodologies for the chemical industry

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 31 publications
(5 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…This can lead to a severe impact on health and safety of people, economy, environmental damages and pollutions, as well as fatalities (CSC, 2018;Matteini, et al, 2018 andMorenoa et al, 2018) in "on-site and/or off-site" seaports' areas.…”
Section: Security Risk Managementmentioning
confidence: 99%
“…This can lead to a severe impact on health and safety of people, economy, environmental damages and pollutions, as well as fatalities (CSC, 2018;Matteini, et al, 2018 andMorenoa et al, 2018) in "on-site and/or off-site" seaports' areas.…”
Section: Security Risk Managementmentioning
confidence: 99%
“…(1) Threat analysis, especially for quantification of the threat, is a considerable challenge since it requires a multitude of data and knowledge, and modeling the motivations, intents, characteristics, capabilities, and tactics of adversaries (Baybutt, 2017;Paté-Cornell and Guikema, 2002). Vulnerability analysis requires a detailed understanding of the design and operation of installations and the threat information (Matteini et al, 2018;Moore et al, 2007;Staalduinen et al, 2016). Security measures can improve the capability of installations against attacks but also may change the attackers' strategies because of the intelligent character of the adversaries (Cox, 2009;Cox, 2008;Powell, 2007).…”
Section: R F T V C mentioning
confidence: 99%
“…Threat analysis is a considerable challenge since it requires a multitude of data and knowledge and modeling the motivations, intents, characteristics, capabilities, and tactics of adversaries [16,17]. Vulnerability analysis requires a detailed understanding of the design and operation of installations and the threat information [18][19][20]. Security measures can improve the capability of installations against attacks but may change the attackers' strategies because of the intelligent character of the adversaries [21][22][23].…”
Section: Introductionmentioning
confidence: 99%