Improving Homeland Security Decisions 2017
DOI: 10.1017/9781316676714.002
|View full text |Cite
|
Sign up to set email alerts
|

Probabilistic Risk Analysis and Terrorism Risk

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
61
0
2

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 43 publications
(63 citation statements)
references
References 460 publications
0
61
0
2
Order By: Relevance
“…Paté-Cornell and Guikema (30) are among the first to apply the techniques of PRA to terrorism risk. Many papers follow, (31)(32)(33)(34)(35) often using simplified models that rely on the definition "Risk = Threat (T) × Vulnerability (V) × Consequence (C)," where subject matter experts assess the threat and vulnerability terms as probabilities, and the consequence term in units of, for example, economic replacement cost, or fatalities. (36,37) When applied to critical infrastructure, the notion is to assess adversary intent as "threat" (38) ) and then rely on such assessments for proposed methods to optimize defense.…”
Section: Nondeliberate Hazards Versus Deliberate Threatsmentioning
confidence: 99%
“…Paté-Cornell and Guikema (30) are among the first to apply the techniques of PRA to terrorism risk. Many papers follow, (31)(32)(33)(34)(35) often using simplified models that rely on the definition "Risk = Threat (T) × Vulnerability (V) × Consequence (C)," where subject matter experts assess the threat and vulnerability terms as probabilities, and the consequence term in units of, for example, economic replacement cost, or fatalities. (36,37) When applied to critical infrastructure, the notion is to assess adversary intent as "threat" (38) ) and then rely on such assessments for proposed methods to optimize defense.…”
Section: Nondeliberate Hazards Versus Deliberate Threatsmentioning
confidence: 99%
“…For the case of failures in cloud data centers and long-distance optical networks infrastructures, empirical studies and hazard maps of potential natural disasters might provide estimation of the probability of occurrence and expected damage [97]. Attacks can be predicted using probabilistic models to assess the risk [203]. Studies in [97], [156], [204], [205] analyze the risk assessment measurement in communication networks, then [206] suggests the integration of the risk assessment in the entire cloud computing infrastructure.…”
Section: F Measurement and Estimation Of Resiliency In Cloud Computingmentioning
confidence: 99%
“…If no valid data is available to inform set K then Ezell et al (2010) recommend that the probabilities of different attacker options should be elicited from experts. However, expert opinion is not necessarily a viable replacement, and care should be taken with the validity of such judgement.…”
Section: Eliciting Expert Opinionmentioning
confidence: 99%