2015
DOI: 10.1155/2015/417597
|View full text |Cite
|
Sign up to set email alerts
|

Mathematical Approach to Security Risk Assessment

Abstract: The goal of this paper is to provide a mathematical threat modeling methodology and a threat risk assessment tool that may assist security consultants at assessing the security risks in their protected systems/plants, nuclear power plants and stores of hazardous substances: explosive atmospheres and flammable and combustible gases and liquids, and so forth, and at building an appropriate risk mitigation policy. The probability of a penetration into the protected objects is estimated by combining the probabilit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…There are multiple articles on methods of risk assessment, and they are widely described e.g., by Sun et al [4], Ting et al [5], and Vrabel et al [6]. The methods are focused mostly on risk estimation for particular problems (e.g., disease [7,8], cancer [9], earthquakes [10], floods [11]) or calculation of risk with the use of various techniques, e.g., Bayesian networks [12,13], attack trees [14], or the Dempster-Shafer theory of belief functions [4].…”
Section: Review Of Existing Methodologies and Algorithmsmentioning
confidence: 99%
“…There are multiple articles on methods of risk assessment, and they are widely described e.g., by Sun et al [4], Ting et al [5], and Vrabel et al [6]. The methods are focused mostly on risk estimation for particular problems (e.g., disease [7,8], cancer [9], earthquakes [10], floods [11]) or calculation of risk with the use of various techniques, e.g., Bayesian networks [12,13], attack trees [14], or the Dempster-Shafer theory of belief functions [4].…”
Section: Review Of Existing Methodologies and Algorithmsmentioning
confidence: 99%
“…This function ensures guarding of free entrance space into the fence by detecting of unwanted entry by person, but at the same time allows completely automatic, i.e. without operator intervention, product entry or its exit [7].…”
Section: Advanced Function Of Light Curtainmentioning
confidence: 99%
“…2016). The infrastructure of developing countries is highly vulnerable and also highly interconnected (Vrabel et al 2015;Smol et al 2020) so risk assessment and management plays a very crucial role in managing resources. However, for a risk assessment to be valuable, it needs to be based on a strong preliminary examination that is generally called baseline study.…”
mentioning
confidence: 99%