2013
DOI: 10.1016/j.ijcip.2013.10.001
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability modeling and analysis for critical infrastructure protection applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 57 publications
(23 citation statements)
references
References 9 publications
0
23
0
Order By: Relevance
“…On the other hand, the use of SecAM does not hamper the application of other UML profiles proposed in the literature and their related transformation approaches aimed at evaluating Concerning the functional requirements analysis, the UML-2-GSPN transformation technique applied in the paper enables to get a Petri Net model that can be used for checking the correctness of the UML specification, by using either state-based techniques (e.g., model checking) or linear algebra/linear programming-based techniques (e.g., invariants computation, structural bound/liveness computation). As future work, we aim at combining SecAM with other formal methods, e.g., Fault Trees or Bayesian Networks as in [32], to be able to address different kinds of analysis.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, the use of SecAM does not hamper the application of other UML profiles proposed in the literature and their related transformation approaches aimed at evaluating Concerning the functional requirements analysis, the UML-2-GSPN transformation technique applied in the paper enables to get a Petri Net model that can be used for checking the correctness of the UML specification, by using either state-based techniques (e.g., model checking) or linear algebra/linear programming-based techniques (e.g., invariants computation, structural bound/liveness computation). As future work, we aim at combining SecAM with other formal methods, e.g., Fault Trees or Bayesian Networks as in [32], to be able to address different kinds of analysis.…”
Section: Discussionmentioning
confidence: 99%
“…Marrone et al [32] model vulnerabilities using UML profiling and propose an analysis based on Bayesian networks. UML-CI is proposed in [33] as a profile for modelling critical infrastructures not focussed on security analysis but on management.…”
Section: Related Workmentioning
confidence: 99%
“…Automatic fare collection system (12) Screen doors (13) Escalator (14) Environment control system (15) Water supply and drainage system (16) Electrical and mechanical control system (17)…”
Section: Degreementioning
confidence: 99%
“…With the increasing of complexity and hazards, there is a need to develop new perspective or approach for infrastructure safety. In the context of the existing literature, some attention is already paid to vulnerability of infrastructure system [11][12][13]. Vulnerability analysis is applied within the management of CIs and some achievements have been made by exploring the impacts of random disturbances, deliberate attacks, and natural disasters.…”
Section: Introductionmentioning
confidence: 99%
“…It provides technical help to the involved departments, organizing coaching to personnel, serving as lead agency for non-governmental organizations (NGOs) and international cooperation, coordinating with the centralized through National Emergency Operation Centre (NEOC) and requiring the department or agency to create there required resources and personnel (Marrone et al, 2013).…”
Section: Introductionmentioning
confidence: 99%