Complexity Challenges in Cyber Physical Systems 2019
DOI: 10.1002/9781119552482.ch12
|View full text |Cite
|
Sign up to set email alerts
|

Cyber‐Physical System Resilience

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…The publications [19][20][21][22] are more theoretical. A discussion of the shortcomings of traditional security metrics is given in [19], the characteristics of «good» metrics are presented; security maturity models with examples are considered.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
See 3 more Smart Citations
“…The publications [19][20][21][22] are more theoretical. A discussion of the shortcomings of traditional security metrics is given in [19], the characteristics of «good» metrics are presented; security maturity models with examples are considered.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…The topics discussed provide answers to questions about the theoretical aspects of the practical application of metrics in terms of «more or less» secure systems, as an approach to comparing the security of different systems. An increase in the level of theorization is presented in [20], where not only formal models of security measurement are presented, but also artificial intelligence methods are proposed for a wide range of applications. A brief description of risk as a security metric, alternative security metrics, and what constitutes a «good» metric can be found in [21].…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, those systems need to be accurately designed and monitored in order to reduce the risk of malfunctions [ 2 ], possibly using agent-based approaches [ 3 , 4 ]. A class of those systems also needs to be certified against international well-established reliability, safety and security standards [ 5 , 6 ].…”
Section: Introductionmentioning
confidence: 99%