Login / Signup
Cybersecurity risk assessment method of ICS based on attack-defense tree model.
Shuang Wang
Lei Ding
He Sui
Zhaojun Gu
Published in:
J. Intell. Fuzzy Syst. (2021)
Keyphrases
</>
risk assessment
tree structure
probabilistic model
evidence theory
sensitivity analysis
evaluation method
evaluation model
network security
anomaly detection
risk management
situation assessment