2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applicat 2019
DOI: 10.1109/idaacs.2019.8924251
|View full text |Cite
|
Sign up to set email alerts
|

AvTA Based Assessment of Dependability Considering Recovery After Failures and Attacks on Vulnerabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 15 publications
0
1
0
Order By: Relevance
“…That were designed to provide a response to these concerns, and then will compare to the results with the attack security tree analysis (AcTA) method, which it helps us to understand the system performance. For our work we take case study the smart building, according to [20], it become part from system design of IoT, and it need to be insuring and security [21].…”
Section: System Performance According To Rbd Ata and Acta Methodsmentioning
confidence: 99%
“…That were designed to provide a response to these concerns, and then will compare to the results with the attack security tree analysis (AcTA) method, which it helps us to understand the system performance. For our work we take case study the smart building, according to [20], it become part from system design of IoT, and it need to be insuring and security [21].…”
Section: System Performance According To Rbd Ata and Acta Methodsmentioning
confidence: 99%
“…Various formal methods, like FMECA-analysis of the fault and attack tree and Markov models of availability, are used to evaluate the reliability of hardware and software (HW and SW) [7]. According to the characteristics of the BAS components and architecture, various service strategies concerning reliability and cyber security are not examined in detail [8][9][10][11]. As a result, the scientific challenge is to develop models and methods of information technology for the availability of Smart Building Information and Control System Cyber security, taking into account attacks on vulnerabilities and defects in software components, common and separate maintenance procedures by reliability, and security [12].…”
Section: Introductionmentioning
confidence: 99%