2011
DOI: 10.1016/j.dss.2011.02.013
|View full text |Cite
|
Sign up to set email alerts
|

Decision support for Cybersecurity risk planning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
39
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 100 publications
(39 citation statements)
references
References 16 publications
0
39
0
Order By: Relevance
“…Another option to treat uncertainty is fuzzy set theory which Rees et al (2011) used in a recent study to develop a decision support system addressing uncertain threat rates, impacts on assets, and countermeasure costs. To achieve this, all approaches require extensive input data like threat probabilities, incident costs, countermeasure costs, countermeasure success probabilities, etc.…”
Section: Related Workmentioning
confidence: 99%
“…Another option to treat uncertainty is fuzzy set theory which Rees et al (2011) used in a recent study to develop a decision support system addressing uncertain threat rates, impacts on assets, and countermeasure costs. To achieve this, all approaches require extensive input data like threat probabilities, incident costs, countermeasure costs, countermeasure success probabilities, etc.…”
Section: Related Workmentioning
confidence: 99%
“…Event Study(ES) methodology has been used determine the stock market impact of a cyber breach [29,30]. [20] VAR (2008) [19] Smith Lim Approach (1984) [17] LRAM (1987) [16,17] SPAN (1990) [16,17] Copula aided BBN (2006) [21] Cognitive Fuzzy Logic(2000) [22] Hidden Markov Model (2006) Fuzzy AHP (2009) ANN for phishing (2011) [27] Fuzzy sets & GA (2011) [26] Gametheoretic approach (2004) [18] Parker's Computer Security program (1981) [16,17] CRAMM (1991) [16,17] CORAS (2002) [16,17] OCTAVE (2003) [16,17] ISRAM (2005) [16,17] RISKPAC (1988) [16,17] Gompertz Diffusion Model (2003) [11] GLM(Logit) (2009) [16] …”
Section: Techniques For Is Risk Assessmentmentioning
confidence: 99%
“…there are estimated the possible risks indicators for the some future time interval, for examp le, based on the methods of the time series extrapolation, auto-regression, and the others [25], [26]. In order to perform the risk pred iction, the special mode ls are used, which describe the prospective state of DCS based on an analysis of its behavior during operations in the previous time intervals [26].…”
Section: Methods For T He Effects Predicting Of T He Dangerous Acmentioning
confidence: 99%