2022
DOI: 10.1007/s43926-022-00027-w
|View full text |Cite
|
Sign up to set email alerts
|

A framework for evaluating security risk in system design

Abstract: Design and development of ubiquitous computer network systems has become increasingly difficult as technology continues to grow. From the introduction of new technologies to the discovery of existing threats, weaknesses, and vulnerabilities there is a constantly changing landscape of potential risks and rewards. The cyber security community, and industry at large, is learning to account for these increasing threats by including protections and mitigations from the beginning of the design V process. However, is… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…The flow of malicious data and control through a system are also of interest to system modelers; recent work has also demonstrated the viability of AADL for the generation of attack trees, e.g., TAMSAT (Wortman & Chandy 2022). Attack trees are similar to fault trees except they focus on malicious activities rather than component failures or unintended occurrences.…”
Section: Securitymentioning
confidence: 99%
“…The flow of malicious data and control through a system are also of interest to system modelers; recent work has also demonstrated the viability of AADL for the generation of attack trees, e.g., TAMSAT (Wortman & Chandy 2022). Attack trees are similar to fault trees except they focus on malicious activities rather than component failures or unintended occurrences.…”
Section: Securitymentioning
confidence: 99%
“…The feature extraction method in DRL extracts the essential features, factors, and patterns relevant to the indexing system. DRL evaluates emergency management systems' content and the indexing accuracy (Wortman and Chandy, 2020). A deep neural network (DNN) is also used in the evaluation, which helps to predict the exact features of an indexing system.…”
Section: Introductionmentioning
confidence: 99%
“…DNN maximizes the accuracy in evaluation that enhances the performance and efficiency ratio of systems. DNN also reduces latency and error range in the evaluation process, thereby improving the feasibility of emergency management systems (Wortman and Chandy, 2020;Ning et al, 2022). Multiple linear regression (MLR) is used in emergency management to identify the exact indexing patterns for different processes.…”
Section: Introductionmentioning
confidence: 99%