Login / Signup

Cybersecurity risk assessment method of ICS based on attack-defense tree model.

Shuang WangLei DingHe SuiZhaojun Gu
Published in: J. Intell. Fuzzy Syst. (2021)
Keyphrases
  • risk assessment
  • tree structure
  • probabilistic model
  • evidence theory
  • sensitivity analysis
  • evaluation method
  • evaluation model
  • network security
  • anomaly detection
  • risk management
  • situation assessment