2017 IEEE International Symposium on Technologies for Homeland Security (HST) 2017
DOI: 10.1109/ths.2017.7943455
|View full text |Cite
|
Sign up to set email alerts
|

A survey of fault and attack tree modeling and analysis for cyber risk management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
3
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(20 citation statements)
references
References 48 publications
0
15
0
Order By: Relevance
“…Chockalingam et al [57] present a survey on integrated safety and security risk assessments methods and their application domains. An overview of approaches based on attack and fault trees has been presented by V. Nagaraju et al [58]. In our review, we consider system analyses without a limitation to a particular approach form, moreover identified methods have been analysed depending on more general categories, e.g., association to existing standards, approach validation, etc.…”
Section: Related Workmentioning
confidence: 99%
“…Chockalingam et al [57] present a survey on integrated safety and security risk assessments methods and their application domains. An overview of approaches based on attack and fault trees has been presented by V. Nagaraju et al [58]. In our review, we consider system analyses without a limitation to a particular approach form, moreover identified methods have been analysed depending on more general categories, e.g., association to existing standards, approach validation, etc.…”
Section: Related Workmentioning
confidence: 99%
“…The risk assessment in Step 3 of our framework (see Table ) involves the use of fault tree analysis for detailed quantitative assessment along with the safety integrity levels (SILs) defined in standards: EN‐50128 (for railway software), which are based on a common standard defined by IEC (International Electrotechnical Commission), IEC 61508 (Functional Safety of Electrical/Electronic/Programmable Electronic Safety‐related Systems standard), used during the development of a safety critical system from any field of application.…”
Section: Proposed Solutionmentioning
confidence: 99%
“…[7]. Carefully thought over tree of the attacks lowers the level of vulnerabilities and risks [8].So, a tree of threats and attacks was constructed to analyze the cyber security of the digital substation ( Fig. 1) A tree of threats and attacks can be constructed for each substation in an understandable form.…”
Section: Tree Of Threats and Attacksmentioning
confidence: 99%