2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN) 2012
DOI: 10.1109/cason.2012.6412412
|View full text |Cite
|
Sign up to set email alerts
|

Taxonomy of security risk assessment approaches for researchers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 26 publications
0
5
0
Order By: Relevance
“…This trend can be observed more clearly in the zoomed graph for the system security (right figure), which declines at the beginning, reaches the bottom around 2, and then ascends slowly. When parameters 01 , 12 , and 23 vary simultaneously, the nonmonotonic change in the attack success probability or the system security becomes more apparent, as demonstrated in Figure 19. The curve for the system security declines quickly at the beginning, then reaches the bottom around 01 = 12 = 23 = 0.4, then starts to increase, and eventually reaches the peak value 1.…”
Section: Effects Of Shape Parametermentioning
confidence: 98%
See 3 more Smart Citations
“…This trend can be observed more clearly in the zoomed graph for the system security (right figure), which declines at the beginning, reaches the bottom around 2, and then ascends slowly. When parameters 01 , 12 , and 23 vary simultaneously, the nonmonotonic change in the attack success probability or the system security becomes more apparent, as demonstrated in Figure 19. The curve for the system security declines quickly at the beginning, then reaches the bottom around 01 = 12 = 23 = 0.4, then starts to increase, and eventually reaches the peak value 1.…”
Section: Effects Of Shape Parametermentioning
confidence: 98%
“…Specifically, Figure 13 illustrates the graphical results when 12 (mean time to infection) varies from 1 second to 1 month. As 12 increases, the attack success probability (P 3 ) reduces or the system security (P 0 + P 1 + P 2 = 1-P 3 ) increases.…”
Section: Effects Of Scale Parametermentioning
confidence: 99%
See 2 more Smart Citations
“…More than 200 qualitative and quantitative methods have been proposed to simplify RM (Paintsil, 2012), such as CRAMM (Yazar, 2002), OCTAVE (Albert and Dorofee, 2003), CORAS (Soldal et al, 2011) and MAGERIT (MFPA, 2012). Most of these methods imply the importance of considering the asset interdependencies in risk assessment and cost-benefit control selection, but only a few of them have formulated these objectives in a well-defined model.…”
Section: Related Workmentioning
confidence: 99%