About: Attack tree-based evaluation of physical protection systems vulnerability     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : http://linked.opendata.cz/ontology/domain/vavai/Vysledek, within Data Space : linked.opendata.cz associated with source document(s)

AttributesValues
rdf:type
rdfs:seeAlso
Description
  • The Attack tree method was originally developed for the purpose of security modeling in the area of information technologies, but gradually it came to spread also in different areas. Particularly in recent years this analytical method has been dynamically developed, and theoretical boundary conditions for its practical application have been worked out. The paper explains the basic principles of the method, tracks its historical development and describes the present state of method theoretical development and the possibilities of its practical implementation. Special attention is paid to analyzing the possibilities of using this method for the evaluation of the vulnerability of physical protection complex systems. The paper specifies both potential benefits of applying the method, and also limitations the method itself or present knowledge in this area can have. The authors of the paper also propose a couple of ways.
  • The Attack tree method was originally developed for the purpose of security modeling in the area of information technologies, but gradually it came to spread also in different areas. Particularly in recent years this analytical method has been dynamically developed, and theoretical boundary conditions for its practical application have been worked out. The paper explains the basic principles of the method, tracks its historical development and describes the present state of method theoretical development and the possibilities of its practical implementation. Special attention is paid to analyzing the possibilities of using this method for the evaluation of the vulnerability of physical protection complex systems. The paper specifies both potential benefits of applying the method, and also limitations the method itself or present knowledge in this area can have. The authors of the paper also propose a couple of ways. (en)
Title
  • Attack tree-based evaluation of physical protection systems vulnerability
  • Attack tree-based evaluation of physical protection systems vulnerability (en)
skos:prefLabel
  • Attack tree-based evaluation of physical protection systems vulnerability
  • Attack tree-based evaluation of physical protection systems vulnerability (en)
skos:notation
  • RIV/45477388:_____/12:#0000001!RIV13-MV0-45477388
http://linked.open...avai/riv/aktivita
http://linked.open...avai/riv/aktivity
  • P(VG20112015040)
http://linked.open...vai/riv/dodaniDat
http://linked.open...aciTvurceVysledku
http://linked.open.../riv/druhVysledku
http://linked.open...iv/duvernostUdaju
http://linked.open...titaPredkladatele
http://linked.open...dnocenehoVysledku
  • 124037
http://linked.open...ai/riv/idVysledku
  • RIV/45477388:_____/12:#0000001
http://linked.open...riv/jazykVysledku
http://linked.open.../riv/klicovaSlova
  • Physical protection system; Vulnerability; Attack tree; Critical infrastructure (en)
http://linked.open.../riv/klicoveSlovo
http://linked.open...ontrolniKodProRIV
  • [7781B48A13B8]
http://linked.open...v/mistoKonaniAkce
  • Boston
http://linked.open...i/riv/mistoVydani
  • Piscataway, NJ
http://linked.open...i/riv/nazevZdroje
  • Proceedings - 46th Annual IEEE International Carnahan Conference on Security Technology
http://linked.open...in/vavai/riv/obor
http://linked.open...ichTvurcuVysledku
http://linked.open...cetTvurcuVysledku
http://linked.open...vavai/riv/projekt
http://linked.open...UplatneniVysledku
http://linked.open...iv/tvurceVysledku
  • Vališ, David
  • Vintr, Zdeněk
  • Malach, Jindřich
http://linked.open...vavai/riv/typAkce
http://linked.open.../riv/zahajeniAkce
issn
  • 1071-6572
number of pages
http://bibframe.org/vocab/doi
  • 10.1109/CCST.2012.6393538
http://purl.org/ne...btex#hasPublisher
  • IEEE
https://schema.org/isbn
  • 978-1-4673-2451-9
Faceted Search & Find service v1.16.118 as of Jun 21 2024


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3240 as of Jun 21 2024, on Linux (x86_64-pc-linux-gnu), Single-Server Edition (126 GB total memory, 58 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2024 OpenLink Software