Proceedings of the Symposium and Bootcamp on the Science of Security 2016
DOI: 10.1145/2898375.2898390
|View full text |Cite
|
Sign up to set email alerts
|

Software and attack centric integrated threat modeling for quantitative risk assessment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 40 publications
(20 citation statements)
references
References 5 publications
0
20
0
Order By: Relevance
“…Thus, the methods of the threat modeling are needed to be evolved. A hybrid method made of three types of threat modeling methods is proposed in [62]. The attack trees are built according to the threat categories of STRIDE.…”
Section: Quantitative Security Methodsmentioning
confidence: 99%
“…Thus, the methods of the threat modeling are needed to be evolved. A hybrid method made of three types of threat modeling methods is proposed in [62]. The attack trees are built according to the threat categories of STRIDE.…”
Section: Quantitative Security Methodsmentioning
confidence: 99%
“…The method utilized prediction graph theory and percolation theory to analyze the risk propagation within cyber physical systems in the power domain. The risk propagation between CPSs is examined in [16] based on logical equations and using attack trees; the examined relationships are between parent and children nodes. The risk propagation within a transport network under various types of attacks was analyzed in [17], using the percolation theory.…”
Section: Related Workmentioning
confidence: 99%
“…The attack tree threat model employs attack trees methodology on cyber-physical systems and networks [74]. The attack trees threat model was first proposed by Bruce Schneider [75] in 1999.…”
Section: ) Attack Tree Threat Modelmentioning
confidence: 99%