2012
DOI: 10.1007/978-3-642-33704-8_25
|View full text |Cite
|
Sign up to set email alerts
|

Security Modeling of Grid Systems Using Petri Nets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…Inspired by CCPS [4] and API [5] methodologies and irrespective of the adopted technique for security assessment-whether attack tree or Bayesian network-most of the developed methodologies since 2003 can be criticized of the same hierarchical approach to security risk assessment. To address this issue, the applicability of techniques such as analytic network process (a multicriteria decision-making technique) [7] and Petri nets [8] which facilitates the feedback (mutual interaction), loops, and nonlinear analysis can be examined.…”
Section: Hierarchical Approach To Security Risk Assessmentmentioning
confidence: 99%
See 1 more Smart Citation
“…Inspired by CCPS [4] and API [5] methodologies and irrespective of the adopted technique for security assessment-whether attack tree or Bayesian network-most of the developed methodologies since 2003 can be criticized of the same hierarchical approach to security risk assessment. To address this issue, the applicability of techniques such as analytic network process (a multicriteria decision-making technique) [7] and Petri nets [8] which facilitates the feedback (mutual interaction), loops, and nonlinear analysis can be examined.…”
Section: Hierarchical Approach To Security Risk Assessmentmentioning
confidence: 99%
“…Also, the sequence of topics at which CSS is taught can be beneficial to the learning process. Chemical safety concepts, which encompasses knowledge on chemical reactivity, chemical value, appropriate chemical storage, and chemical transport is best taught prior to security concepts, as this will dictate on how security measures in a chemical plant are designed [8]. A simple example is the need for knowledge on chemical reactivity to determine whether a chemical is attractive to adversaries before appropriate access controls can be chosen, or decide on where to store the chemical in a graded protection system of security control.…”
Section: The Role Of Education and Ethicsmentioning
confidence: 99%