Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees.
Olga GadyatskayaCarlo HarpesSjouke MauwCédric MullerSteve MullerPublished in: GraMSec@CSF (2016)
Keyphrases
- risk assessment
- risk management
- risk factors
- network security
- risk analysis
- real world
- evidence theory
- fuzzy multi criteria decision making
- information security
- decision making
- power plant
- information technology
- emergency management
- intrusion detection
- low cost
- rough sets
- knowledge base
- artificial intelligence
- real time