Access the full text.
Sign up today, get DeepDyve free for 14 days.
Y. Haimes, P. Jiang (2001)
Leontief-Based Model of Risk in Complex Interconnected InfrastructuresJournal of Infrastructure Systems, 7
Y. Haimes (1991)
Total Risk ManagementRisk Analysis, 11
Do Minh (2000)
Applied Probability Models
D. Bertsekas, J. Tsitsiklis (1991)
An Analysis of Stochastic Shortest Path ProblemsMath. Oper. Res., 16
S. Kaplan, B. Garrick (1981)
On The Quantitative Definition of RiskRisk Analysis, 1
T. Longstaff, C. Chittister, R. Pethia, Y. Haimes (2000)
Are we forgetting the risks of information technology?Computer, 33
Haimes Haimes, Horowitz Horowitz (2004)
Adaptive two‐player hierarchical holographic modeling game for counterterrorism intelligence analysisJournal of Homeland Security and Emergency Management, 1
Y. Haimes (2005)
Risk Modeling, Assessment, and Management: Haimes/Risk Modeling, Assessment 2e
J. Santos, Y. Haimes (2004)
Modeling the Demand Reduction Input‐Output (I‐O) Inoperability Due to Terrorism of Interconnected Infrastructures *Risk Analysis, 24
Y. Haimes (1981)
Hierarchical Holographic ModelingIEEE Transactions on Systems, Man, and Cybernetics, 11
Asbeck Asbeck, Haimes Haimes (1984)
The partitioned multiobjective risk methodLarge Scale Systems, 6
Y. Haimes, S. Kaplan, J. Lambert (2002)
Risk Filtering, Ranking, and Management Framework Using Hierarchical Holographic ModelingRisk Analysis, 22
M. Sahinoglu (1992)
Compound-Poisson Software Reliability ModelIEEE Trans. Software Eng., 18
Y. Haimes, B. Horowitz (2011)
Journal of Homeland Security and Emergency Management Adaptive Two-Player Hierarchical Holographic Modeling Game for Counterterrorism Intelligence Analysis
Y. Haimes, N. Matalas, J. Lambert, B. Jackson, James Fellows (1998)
Reducing vulnerability of water supply systems to attackJournal of Infrastructure Systems, 4
Y. Haimes, Clyde Chittester (2005)
A Roadmap for Quantifying the Efficacy of Risk Management of Information Security and Interdependent SCADA SystemsJournal of Homeland Security and Emergency Management, 2
The risk of cyber attacks on process control networks (PCN) is receiving significant attention due to the potentially catastrophic extent to which PCN failures can damage the infrastructures and commodity flows that they support. Risk management addresses the coupled problems of (1) reducing the likelihood that cyber attacks would succeed in disrupting PCN operation and (2) reducing the severity of consequences in the event of PCN failure or manipulation. The Network Security Risk Model (NSRM) developed in this article provides a means of evaluating the efficacy of candidate risk management policies by modeling the baseline risk and assessing expectations of risk after the implementation of candidate measures. Where existing risk models fall short of providing adequate insight into the efficacy of candidate risk management policies due to shortcomings in their structure or formulation, the NSRM provides model structure and an associated modeling methodology that captures the relevant dynamics of cyber attacks on PCN for risk analysis. This article develops the NSRM in detail in the context of an illustrative example.
Risk Analysis – Wiley
Published: Feb 1, 2009
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.