Wiley Handbook of Science and Technology for Homeland Security 2008
DOI: 10.1002/9780470087923.hhs004
|View full text |Cite
|
Sign up to set email alerts
|

Logic Trees: Fault, Success, Attack, Event, Probability, and Decision Trees

Abstract: This article describes the fundamentals of logic trees used in decision and risk analysis. We include in the broad definition of logic trees any conceptual or mathematical model that describes scenarios of events and/or decisions in a treelike structure. Logic trees are important tools for analyzing uncertain events, defining accident scenarios, assessing risk, calculating joint probability distributions, and evaluating decision options. Six types of logic trees are described, compared, and illustrated in this… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 39 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…Compared to an IRT, the attack tree is a complementary model in the sense that it can be used to estimate the probability of top events. In a comprehensive risk analysis, the probability of the top event can then be connected to the initiating event in the IRT, (21) i.e., the attack tree analysis may provide some of the statistics needed for an IRT analysis. Compared to an IRT, the protection tree is a complementary model in that it can be used to estimate how countermeasures can be made more effective.…”
Section: Discussionmentioning
confidence: 99%
“…Compared to an IRT, the attack tree is a complementary model in the sense that it can be used to estimate the probability of top events. In a comprehensive risk analysis, the probability of the top event can then be connected to the initiating event in the IRT, (21) i.e., the attack tree analysis may provide some of the statistics needed for an IRT analysis. Compared to an IRT, the protection tree is a complementary model in that it can be used to estimate how countermeasures can be made more effective.…”
Section: Discussionmentioning
confidence: 99%
“…Fault tree analysis (FTA) [122,123] � It focusses on a system's safety and reliability. � It can be used for observing the impact and likelihood of equipment failure.…”
Section: Technique Descriptionmentioning
confidence: 99%
“…Regarding the crucial issue of terrorism risk, there is no single definition that is widely adopted; in general, the notion of terrorism risk is related to threats, attacks, vulnerabilities, consequences of the attacks, uncertainties, and probabilities (Aven & Guikema, 2015). Given the above‐mentioned facets of terrorism risk, a discussion about the applicability of probabilistic approaches for threat assessment in such situations (Ezell et al., 2010) has included Logic Trees (e.g., Dillon‐Merrill et al., 2008) and Bayesian Network analysis (e.g., Hudson et al., 2005). Regression analysis has also been employed to model regional terrorism risk (Chatterjee & Abkowitz, 2011) taking into consideration the population density and the number of critical infrastructures in each region.…”
Section: Related Workmentioning
confidence: 99%