Proceedings of the 30th European Safety and Reliability Conference and 15th Probabilistic Safety Assessment and Management Conf 2020
DOI: 10.3850/978-981-14-8593-0_4283-cd
|View full text |Cite
|
Sign up to set email alerts
|

Threat Analysis: Scenarios and their Likelihoods

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…According to Gausemeier et al (1998), a scenario is defined as "a generally intelligible description of a possible situation in the future, based on a complex network of influence-factors". Scenario analyses are applied in several fields, such as threat analysis (Lichte et al, 2020;Witte et al, 2020;Conrado and de Oude, 2014), risk analysis (López-Silva et al, 2015), resilience management (Lichte et al, 2022), and also in emergency management (Comes et al, 2012;Schätter, 2014).…”
Section: Morphological Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…According to Gausemeier et al (1998), a scenario is defined as "a generally intelligible description of a possible situation in the future, based on a complex network of influence-factors". Scenario analyses are applied in several fields, such as threat analysis (Lichte et al, 2020;Witte et al, 2020;Conrado and de Oude, 2014), risk analysis (López-Silva et al, 2015), resilience management (Lichte et al, 2022), and also in emergency management (Comes et al, 2012;Schätter, 2014).…”
Section: Morphological Analysismentioning
confidence: 99%
“…All scenario-factors are listed in the top row and their states in the columns below the respective factor (Johansen, 2018). For more examples of how to create a morphological box for scenario analysis, see Witte et al (2020) or Schneider et al (2021).…”
Section: Morphological Analysismentioning
confidence: 99%
“…For example, Paté-Cornell and Guikema (2002) describe a Bayesian network which weights the likelihoods of scenarios based on the expected utility for the attacker. Witte et al (2020) describe how to build such a Bayesian network on top of a morphological analysis.…”
Section: Introductionmentioning
confidence: 99%
“…The association of these values corresponds to ISO/SAE 21434 of an Attack Feasibility category (SAE 2022). From a physical perspective, this is the threat probability (Witte et al 2020). For CVSS, in addition to the Exploitability, the Impact, consisting of the protection goal violation of confidentiality, availability and integrity, is further used to determine the Vulnerability Score.…”
Section: Introductionmentioning
confidence: 99%