Sciweavers

136 search results - page 1 / 28
» Securing interdependent assets
Sort
View
119
Voted
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 15 days ago
Stochastic Games for Security in Networks with Interdependent Nodes
This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take pa...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
108
Voted
SMC
2007
IEEE
108views Control Systems» more  SMC 2007»
15 years 6 months ago
Cybersecurity for electric power control and automation systems
—Disruption of electric power operations can be catastrophic on the national security and economy. Due to the complexity of widely dispersed assets and the interdependency betwee...
Chee-Wooi Ten, Manimaran Govindarasu, Chen-Ching L...
92
Voted
ISI
2007
Springer
15 years 6 months ago
Managing Security Threats and Vulnerabilities for Small to Medium Enterprises
– The difficulty in managing security threats and vulnerabilities for small and medium-sized enterprises (SME) is investigated. A detailed conceptual framework for asset and thre...
Cyril Onwubiko, Andrew P. Lenaghan
64
Voted
ESORICS
2008
Springer
15 years 2 months ago
Identifying Critical Attack Assets in Dependency Attack Graphs
Reginald E. Sawilla, Xinming Ou
92
Voted
CRITIS
2008
15 years 2 months ago
Interdependency Analysis in Electric Power Systems
Silvano Chiaradonna, Felicita Di Giandomenico, Pao...