Have a personal or library account? Click to login
Real–Time Hierarchical Predictive Risk Assessment at the National Level: Mutually Agreed Predicted Service Disruption Profiles Cover

Real–Time Hierarchical Predictive Risk Assessment at the National Level: Mutually Agreed Predicted Service Disruption Profiles

Open Access
|Sep 2020

References

  1. Bertsekas, D. and Tsitsiklis, J. (1989). Parallel and Distributed Computation: Numerical Methods, Prentice Hall, Englewood Cliffs, NJ.
  2. EU (2016). Directive (EU) 2016/1148 of the European Parliament and of the Council of the European Union of 6 July 2016 concerning measures for a high common level of security of network and information systems across the union, Official Journal of the European Union59: L194/1–L194/30.
  3. ENISA (2013). National-level risk assessments an analysis report—Executive summary, Technical report, European Union Agency for Network and Information Security, Heraklion.
  4. Findeisen, W., Bailey, F.N., Brdyś, M., Malinowski, K., Tatjewski, P. and Woźniak, A. (1980). Control and Coordination in Hierarchical Systems, Wiley, Chichester.
  5. Frommer, A. (1991). Generalized nonlinear diagonal dominance and applications to asynchronous iterative methods, Journal of Computational and Applied Mathematics38(1): 105–124.10.1016/0377-0427(91)90164-F
  6. Haimes, Y. (2016). Risk Modeling, Assessment, and Management (4th Edition), Wiley, Hoboken, NJ.
  7. Haimes, Y., Santos, J., Crowther, K., Henry, M., Lian, C. and Yan, Z. (2007). Risk analysis in interdependent infrastructure, in E. Goetz and S. Shenoi (Eds), Critical Infrastructure Protection, Springer, Boston, MA, pp. 297–310.10.1007/978-0-387-75462-8_21
  8. Kalantarnia, M., Khan, F. and Hawboldt, K. (2009). Dynamic risk assessment using failure assessment and Bayesian theory, Journal of Loss Prevention in the Process Industries22(5): 600–606.10.1016/j.jlp.2009.04.006
  9. Karbowski, A., Malinowski, K., Szwaczyk, S. and Jaskóła, P. (2019). Critical infrastructure risk assessment using Markov chain model, Journal of Telecommunications and Information Technology2019(2): 15–20.10.26636/jtit.2019.130819
  10. Khan, F., Hashemi, S.J., Paltrinieri, N., Amyotte, P., Cozzani, V. and Reniers, G. (2016). Dynamic risk management: A contemporary approach to process safety management, Current Opinion in Chemical Engineering14: 9–17.10.1016/j.coche.2016.07.006
  11. Kołodziej, J. and Xhafa, F. (2011). Modern approaches to modeling user requirements on resource and task allocation in hierarchical computational grids, International Journal of Applied Mathematics and Computer Science21(2): 243–257, DOI: 10.2478/v10006-011-0018-x.10.2478/v10006-011-0018-x
  12. König, S., Schaberreiter, T., Rass, S. and Schauer, S. (2019). A measure for resilience of critical infrastructures, in E. Luiijf et al. (Eds), Critical Information Infrastructures Security, Springer, Cham, pp. 57–71.10.1007/978-3-030-05849-4_5
  13. Lian, C. and Haimes, Y.Y. (2006). Managing the risk of terrorism to interdependent infrastructure systems through the dynamic inoperability input–output model, Systems Engineering9(3): 241–258.10.1002/sys.20051
  14. López, Pastor, D. and Villalba, L.J.G. (2013). Dynamic risk assessment in information systems: State-of-the-art, Proceedings of the 6th International Conference on Information Technology (ICIT 2013), Amman, Jordan, pp. 1–9.
  15. Malinowski, K. and Karbowski, A. (2019). Hierarchical on-line risk assessment at national level, International Conference on Military Communications and Information Systems (ICMCIS 2019), Budva, Montenegro, pp. 1–5.
  16. Mesarović, M., Macko, D. and Takahara, Y. (1970). Theory of Multi-Level Hierarchical Systems, Academic Press, New York, NY.
  17. Naumov, S. and Kabanov, I. (2016). Dynamic framework for assessing cyber security risks in a changing environment, Proceedings of the 2016 International Conference on Information Science and Communication Technologies (ICISCT 2016), Tashkent, Uzbekistan, pp. 1–4.
  18. NIST (2012). Guide for conducting risk assessments, information security, NIST special publication 800-30, Revision 1, Technical report, US Department of Commerce, National Institute of Standards and Technology, Gaithersburg, MD.
  19. Poolsappasit, N., Dewri, R. and Ray, I. (2012). Dynamic security risk management using Bayesian attack graphs, IEEE Transactions on Dependable and Secure Computing9(1): 61–74.10.1109/TDSC.2011.34
  20. Rausand, M. (2011). Risk Assessment; Theory, Methods, and Applications, Wiley, Hoboken, NJ.10.1002/9781118281116
  21. Settanni, G., Skopik, F., Shovgenya, Y., Fiedler, R., Carolan, M., Conroy, D., Boettinger, K., Gall, M., Brost, G., Ponchel, C., Haustein, M., Kaufmann, H., Theuerkauf, K. and Olli, P. (2017). A collaborative cyber incident management system for European interconnected critical infrastructures, Journal of Information Security and Applications34(2): 166–182.10.1016/j.jisa.2016.05.005
  22. Skopik, F., Settanni, G. and Fiedler, R. (2016). A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing, Computers & Security60: 154–176.10.1016/j.cose.2016.04.003
  23. Szwed, P. and Skrzyński, P. (2014). A new lightweight method for security risk assessment based on fuzzy cognitive maps, International Journal of Applied Mathematics and Computer Science24(1): 213–225, DOI: 10.2478/amcs-2014-0016.10.2478/amcs-2014-0016
  24. Viduto, V., Maple, C., Huang, W. and López-Peréz, D. (2012). A novel risk assessment and optimization model for a multi-objective network security countermeasure selection problem, Decision Support Systems53(3): 569–610.10.1016/j.dss.2012.04.001
  25. Zhang, Q., Zhou, C., Xiong, N., Qin, Y., Li, X. and Huang, S. (2016). Multimodel-based incident prediction and risk assessment in dynamic cybesecurity protection for industrial control systems, IEEE Transactions on Systems, Man and Cybernetics46(10): 1426–1444.10.1109/TSMC.2015.2503399
  26. Zwikael, O. and Smyrk, J. (2019). Project Management: A Benefit Realisation Approach, Springer, Cham.10.1007/978-3-030-03174-9
DOI: https://doi.org/10.34768/amcs-2020-0044 | Journal eISSN: 2083-8492 | Journal ISSN: 1641-876X
Language: English
Page range: 597 - 609
Submitted on: Dec 27, 2019
Accepted on: Jun 5, 2020
Published on: Sep 29, 2020
Published by: University of Zielona Góra
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2020 Krzysztof Malinowski, Andrzej Karbowski, published by University of Zielona Góra
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.