2020
DOI: 10.1016/j.anucene.2020.107790
|View full text |Cite
|
Sign up to set email alerts
|

Development of a method for quantifying relative importance of NPP cyber attack probability variables based on factor analysis and AHP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…FA is a multivariate statistical analysis technique based on the extension of PCA, which starts from the analysis of the correlation between the variables and groups the intricate variables based on the magnitude of the correlation so that the correlation between the variables within a group is higher than the correlation between the variables between the groups. Ultimately, according to the grouping, the variables are organized into a few unmeasured, independent, and representative common factors and some ignorable particular factors (Kim et al, 2020). The core of FA is to reflect most of the information of the original variables with a few common factors.…”
Section: Methodsmentioning
confidence: 99%
“…FA is a multivariate statistical analysis technique based on the extension of PCA, which starts from the analysis of the correlation between the variables and groups the intricate variables based on the magnitude of the correlation so that the correlation between the variables within a group is higher than the correlation between the variables between the groups. Ultimately, according to the grouping, the variables are organized into a few unmeasured, independent, and representative common factors and some ignorable particular factors (Kim et al, 2020). The core of FA is to reflect most of the information of the original variables with a few common factors.…”
Section: Methodsmentioning
confidence: 99%
“…In most cases, it is difficult to measure or prioritize decision-making criteria because they are subjective and not measurable. One of the advantages of AHP is that this method can systematically convert abstract and non-measurable criteria into numerical values [41]. In addition, one of the most important benefits provided by the AHP method is that this method can measure the consistency degree of binary comparisons.…”
Section: Methodsmentioning
confidence: 99%
“…Expert practitioners were asked to do the pairwise comparisons. Kim et al [48] used AHP to examine cyber-attack taxonomy in Nuclear Power Plants. The primary criteria were divided into attacker related variables with sub-criteria like attack skill and intensity, and target related variables that included the sub-criteria of physical access, logical access, and attack surface.…”
Section: A Using Ahp To Assess Securitymentioning
confidence: 99%
“…IoT Security [35] Identity Resolution Security Trust, user experience [36] IoT Device Security Known vulnerabilities, sensor capabilities, operational context [37] Fog-IoT Security Authentication, access control, intrusion detection, trust, integrity [38] Level of Trust in Fog Quality of service, quality of security [39] Internet of Health Security Confidentiality, authentication, access control, and integrity [41] IoT in the Enterprise Tangible factors, intangible factors [42] IoT Security Perceptual, transport, application, and cloud security Web Application Security [43] Website Usability-Security Confidentiality, integrity, accountability, authentication, durability, usability [44] Sustainable Security Confidentiality, integrity, availability, per-durability [45] Website Security Accidental threat, malicious threat, physical attach, malicious code, or virus Application Security [46] Software Security Integrity, access control, confidentiality, and authentication [47] Usability Security Confidentiality, integrity, accountability, authentication, durability, usability [48] Nuclear Plant Security Attacker's skill, physical access, logical access, and attack surface [49] HRIS Security Confidentiality, integrity, non-repudiation, privacy, and availability [50] E-Commerce Security Technical, environmental, managerial [51] E-Banking Security Management, technology, economy, and culture…”
Section: A Using Ahp To Assess Securitymentioning
confidence: 99%