2014 Ninth International Conference on Availability, Reliability and Security 2014
DOI: 10.1109/ares.2014.86
|View full text |Cite
|
Sign up to set email alerts
|

Risk-Aware Design and Management of Resilient Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 25 publications
0
11
0
Order By: Relevance
“…A proposal of linear optimization of risk mitigation strategies is outlined in Chołda (2014). In fact, in our previous works (Chołda et al, 2014b;Chołda and Jaglarz, 2015), we propose optimization approaches based on risk mitigation, but do not elaborate on the precise optimization/simulation-based approach to obtain the exact results, as is done here.…”
Section: Risk Mitigationmentioning
confidence: 98%
“…A proposal of linear optimization of risk mitigation strategies is outlined in Chołda (2014). In fact, in our previous works (Chołda et al, 2014b;Chołda and Jaglarz, 2015), we propose optimization approaches based on risk mitigation, but do not elaborate on the precise optimization/simulation-based approach to obtain the exact results, as is done here.…”
Section: Risk Mitigationmentioning
confidence: 98%
“…From the business viewpoint, basic responses (e.g., risk avoidance, transfer, or acceptance [16,18]) can be very different, but a crucial option in the design of resilient networks is risk mitigation. It involves recovery methods to decrease the risk R by reducing impact (i.e., penalties) of failures.…”
Section: Risk Responsementioning
confidence: 99%
“…A proposal of linear optimization of risk mitigation strategies is outlined in [18]. Vajanapoom and Tipper [58] present a set of papers on the topic, with the most comprehensive presenting linear programming-based models applying the risk exposure measure.…”
Section: Risk Awareness In Resilient Network Designmentioning
confidence: 99%
See 1 more Smart Citation
“…Typical decisions that are relevant in the technical context are as follows: acceptance when nothing is done about the recognized risks (no changes in comparison to the actual state are necessary); avoidance of situations where threats take place (elimination of a problematic information system with many vulnerabilities); reduction of the likelihood (addition of a firewall decreasing the number of successful attacks); mitigation of the impact, the most popular decision (encryption of data so that it cannot be used even if stolen). Three most common strategies apply to mitigation [18], [19], see • Risk minimization: choice of the minimum impact possible; can be very costly but might be the first choice especially in critical infrastructures, where the public good is most important.…”
Section: B Risk Responsementioning
confidence: 99%