2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference On 2013
DOI: 10.1109/uic-atc.2013.78
|View full text |Cite
|
Sign up to set email alerts
|

Model-Driven Estimation of Distributed Vulnerability in Complex Railway Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…For example, vulnerability analysis focused methods look toward the success of a malicious cyber-attack against the modelled node. In contrast, risk-based approaches highlight the threat actors' actions that could affect the system through variables of probability, damage, and likelihood [27]. Both focuses are key to understanding the complex nature regarding SCI, which attributes can be heavily dissected to understand ToEd systems fully.…”
Section: Threat Modelling Cyber-physical Systemsmentioning
confidence: 99%
“…For example, vulnerability analysis focused methods look toward the success of a malicious cyber-attack against the modelled node. In contrast, risk-based approaches highlight the threat actors' actions that could affect the system through variables of probability, damage, and likelihood [27]. Both focuses are key to understanding the complex nature regarding SCI, which attributes can be heavily dissected to understand ToEd systems fully.…”
Section: Threat Modelling Cyber-physical Systemsmentioning
confidence: 99%
“…AADL and Modelica were used in [158,160], where both Modelica and AADL were transformed to each other. In [43], authors used Critical Infrastructure Protection -Vulnerability Analysis and Modeling (CIP VAM) UML profile to transform UML models to Bayesian Network (BN) models. In [105], the authors transformed UML models to Distributed Embedded Real-time Compact Specification (DERCS) models with using GenERTiCA.…”
Section: System Designmentioning
confidence: 99%
“…It refers to the public infrastructures and valuable properties. Applications grouped under this category cover smart grids [61,97,142,32,152,75,15,16], Irrigation Networks [139], railway networks [43,42], water distribution systems [64].…”
Section: Targeted Cps Application Domainsmentioning
confidence: 99%
“…In this Section, a M2M generating a BN model from an AT S is shown: other approaches generating BNs in the field of vulnerability evaluation are present in literature [3].…”
Section: Transforming Attack Trees Into Bayesian Networkmentioning
confidence: 99%