Applications of Bayesian networks and Petri nets in safety, reliability, and risk assessments: A review

S Kabir, Y Papadopoulos - Safety science, 2019 - Elsevier
Abstract System safety, reliability and risk analysis are important tasks that are performed
throughout the system life-cycle to ensure the dependability of safety-critical systems …

DAG-based attack and defense modeling: Don't miss the forest for the attack trees

B Kordy, L Piètre-Cambacédès, P Schweitzer - Computer science review, 2014 - Elsevier
This paper presents the current state of the art on attack and defense modeling approaches
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …

Specification-based intrusion detection for advanced metering infrastructures

R Berthier, WH Sanders - 2011 IEEE 17th Pacific rim …, 2011 - ieeexplore.ieee.org
It is critical to develop an effective way to monitor advanced metering infrastructures (AMI).
To ensure the security and reliability of a modernized power grid, the current deployment of …

Dynamic system safety analysis in HiP-HOPS with Petri Nets and Bayesian Networks

S Kabir, M Walker, Y Papadopoulos - Safety science, 2018 - Elsevier
Dynamic systems exhibit time-dependent behaviours and complex functional dependencies
amongst their components. Therefore, to capture the full system failure behaviour, it is not …

Lightweight agents for intrusion detection

G Helmer, JSK Wong, V Honavar, L Miller… - Journal of systems and …, 2003 - Elsevier
We have designed and implemented an intrusion detection system (IDS) prototype based on
mobile agents. Our agents travel between monitored systems in a network of distributed …

A software fault tree approach to requirements analysis of an intrusion detection system

G Helmer, J Wong, M Slagell, V Honavar… - Requirements …, 2002 - Springer
Requirements analysis for an intrusion detection system (IDS) involves deriving
requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a …

A dimensionality reduction-based efficient software fault prediction using Fisher linear discriminant analysis (FLDA)

A Kalsoom, M Maqsood, MA Ghazanfar, F Aadil… - The Journal of …, 2018 - Springer
Software quality is an important factor in the success of software companies. Traditional
software quality assurance techniques face some serious limitations especially in terms of …

An empirical evaluation of the effectiveness of attack graphs and fault trees in cyber-attack perception

HS Lallie, K Debattista, J Bal - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Perceiving and understanding cyber-attacks can be a difficult task. This problem is widely
recognized and welldocumented, and more effective techniques are needed to aid cyber …

Collaborative attack modeling

J Steffan, M Schumacher - Proceedings of the 2002 ACM symposium on …, 2002 - dl.acm.org
Avoidance and discovery of security vulnerabilities in information systems requires
awareness of typical risks and a good understanding of vulnerabilities and their …

A systematic approach to multi-stage network attack analysis

J Dawkins, J Hale - Second IEEE International Information …, 2004 - ieeexplore.ieee.org
Network security analysis must coordinate diverse sources of information to support effective
security models. The modeling, process must capture security-relevant information about …