Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems: cyber risk at the edge
Author
Abstract
Suggested Citation
DOI: 10.1007/s10669-020-09792-x
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Setola, Roberto & De Porcellinis, Stefano & Sforna, Marino, 2009. "Critical infrastructure dependency assessment using the input–output inoperability model," International Journal of Critical Infrastructure Protection, Elsevier, vol. 2(4), pages 170-178.
- Stergiopoulos, George & Kotzanikolaou, Panayiotis & Theocharidou, Marianthi & Lykou, Georgia & Gritzalis, Dimitris, 2016. "Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures," International Journal of Critical Infrastructure Protection, Elsevier, vol. 12(C), pages 46-60.
- Zhang, Pengcheng & Peeta, Srinivas, 2011. "A generalized modeling framework to analyze interdependencies among infrastructure systems," Transportation Research Part B: Methodological, Elsevier, vol. 45(3), pages 553-579, March.
- Laugé, Ana & Hernantes, Josune & Sarriegi, Jose M., 2015. "Critical infrastructure dependencies: A holistic, dynamic and quantitative approach," International Journal of Critical Infrastructure Protection, Elsevier, vol. 8(C), pages 16-23.
- Daniel Schatz & Rabih Bashroush, 2017. "Economic valuation for information security investment: a systematic literature review," Information Systems Frontiers, Springer, vol. 19(5), pages 1205-1228, October.
- Yosra Miaoui & Noureddine Boudriga, 2019. "Enterprise security investment through time when facing different types of vulnerabilities," Information Systems Frontiers, Springer, vol. 21(2), pages 261-300, April.
- Saini Das & Arunabha Mukhopadhyay & Debashis Saha & Samir Sadhukhan, 2019. "A Markov-Based Model for Information Security Risk Assessment in Healthcare MANETs," Information Systems Frontiers, Springer, vol. 21(5), pages 959-977, October.
- Radanliev, Petar & De Roure, David & Nicolescu, Razvan & Huth, Michael & Mantilla Montalvo, Rafael & Cannady, Stacy & Burnap, Peter, 2018. "Future developments in cyber risk assessment for the internet of things," MPRA Paper 92567, University Library of Munich, Germany, revised Sep 2018.
- Yosra Miaoui & Noureddine Boudriga, 0. "Enterprise security investment through time when facing different types of vulnerabilities," Information Systems Frontiers, Springer, vol. 0, pages 1-40.
- Daniel Schatz & Rabih Bashroush, 0. "Economic valuation for information security investment: a systematic literature review," Information Systems Frontiers, Springer, vol. 0, pages 1-24.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Zachary A. Collier & James H. Lambert & Igor Linkov, 2021. "Algorithms and models for decision making in advanced technology systems," Environment Systems and Decisions, Springer, vol. 41(2), pages 179-180, June.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Mazaher Kianpour & Stewart J. Kowalski & Harald Øverby, 2021. "Systematically Understanding Cybersecurity Economics: A Survey," Sustainability, MDPI, vol. 13(24), pages 1-28, December.
- Martin Eling & Michael McShane & Trung Nguyen, 2021. "Cyber risk management: History and future research directions," Risk Management and Insurance Review, American Risk and Insurance Association, vol. 24(1), pages 93-125, March.
- Harašta, Jakub, 2018. "Legally critical: Defining critical infrastructure in an interconnected world," International Journal of Critical Infrastructure Protection, Elsevier, vol. 21(C), pages 47-56.
- Fang, Zhixiang & Shaw, Shih-Lung & Tu, Wei & Li, Qingquan & Li, Yuguang, 2012. "Spatiotemporal analysis of critical transportation links based on time geographic concepts: a case study of critical bridges in Wuhan, China," Journal of Transport Geography, Elsevier, vol. 23(C), pages 44-59.
- Linn Svegrup & Jonas Johansson & Henrik Hassel, 2019. "Integration of Critical Infrastructure and Societal Consequence Models: Impact on Swedish Power System Mitigation Decisions," Risk Analysis, John Wiley & Sons, vol. 39(9), pages 1970-1996, September.
- David Rios Insua & Aitor Couce‐Vieira & Jose A. Rubio & Wolter Pieters & Katsiaryna Labunets & Daniel G. Rasines, 2021. "An Adversarial Risk Analysis Framework for Cybersecurity," Risk Analysis, John Wiley & Sons, vol. 41(1), pages 16-36, January.
- Mateusz Iwo Dubaniowski & Hans R. Heinimann, 2020. "A framework for modeling interdependencies among households, businesses, and infrastructure systems; and their response to disruptions," Papers 2006.05678, arXiv.org.
- Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.
- Chenglong Zhang & Nan Feng & Jianjian Chen & Dahui Li & Minqiang Li, 0. "Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities," Information Systems Frontiers, Springer, vol. 0, pages 1-18.
- Å arÅ«nienÄ—, Inga & MartiÅ¡auskas, Linas & KrikÅ¡tolaitis, RiÄ ardas & Augutis, Juozas & Setola, Roberto, 2024. "Risk assessment of critical infrastructures: A methodology based on criticality of infrastructure elements," Reliability Engineering and System Safety, Elsevier, vol. 243(C).
- Zenonas Turskis & Nikolaj Goranin & Assel Nurusheva & Seilkhan Boranbayev, 2019. "A Fuzzy WASPAS-Based Approach to Determine Critical Information Infrastructures of EU Sustainable Development," Sustainability, MDPI, vol. 11(2), pages 1-25, January.
- Chenglong Zhang & Nan Feng & Jianjian Chen & Dahui Li & Minqiang Li, 2021. "Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities," Information Systems Frontiers, Springer, vol. 23(3), pages 773-790, June.
- Radanliev, Petar & De Roure, David & R.C. Nurse, Jason & Burnap, Pete & Anthi, Eirini & Ani, Uchenna & Maddox, La’Treall & Santos, Omar & Mantilla Montalvo, Rafael, 2019. "Definition of Internet of Things (IoT) Cyber Risk – Discussion on a Transformation Roadmap for Standardization of Regulations, Risk Maturity, Strategy Design and Impact Assessment," MPRA Paper 92569, University Library of Munich, Germany.
- Simon Trang & Benedikt Brendel, 2019. "A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research," Information Systems Frontiers, Springer, vol. 21(6), pages 1265-1284, December.
- Tejaswini C. Herath & Hemantha S. B. Herath & David Cullum, 2023. "An Information Security Performance Measurement Tool for Senior Managers: Balanced Scorecard Integration for Security Governance and Control Frameworks," Information Systems Frontiers, Springer, vol. 25(2), pages 681-721, April.
- Klein, Peter & Klein, Fabian, 2019. "Dynamics of interdependent critical infrastructures – A mathematical model with unexpected results," International Journal of Critical Infrastructure Protection, Elsevier, vol. 24(C), pages 69-77.
- Lam, C.Y. & Tai, K., 2018. "Modeling infrastructure interdependencies by integrating network and fuzzy set theory," International Journal of Critical Infrastructure Protection, Elsevier, vol. 22(C), pages 51-61.
- Chopra, Shauhrat S. & Khanna, Vikas, 2015. "Interconnectedness and interdependencies of critical infrastructures in the US economy: Implications for resilience," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 436(C), pages 865-877.
- Martin (Dae Youp) Kang & Anat Hovav, 2020. "Benchmarking Methodology for Information Security Policy (BMISP): Artifact Development and Evaluation," Information Systems Frontiers, Springer, vol. 22(1), pages 221-242, February.
- Hernandez-Fajardo, Isaac & Dueñas-Osorio, Leonardo, 2013. "Probabilistic study of cascading failures in complex interdependent lifeline systems," Reliability Engineering and System Safety, Elsevier, vol. 111(C), pages 260-272.
More about this item
Keywords
Functional dependency; Network-based linear dependency modelling; Internet of things; Micro-mort model; Goal-oriented approach; Transformation roadmap; Cyber risk regulations; Empirical analysis; Cyber risk self-assessment; Cyber risk target state;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:envsyd:v:41:y:2021:i:2:d:10.1007_s10669-020-09792-x. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.