A review of cyber security risk assessment methods for SCADA systems
Top Cited Papers
Open Access
- 1 February 2016
- journal article
- review article
- Published by Elsevier BV in Computers & Security
- Vol. 56, 1-27
- https://doi.org/10.1016/j.cose.2015.09.009
Abstract
No abstract availableKeywords
Funding Information
- Airbus Group Endeavr Wales (AG-EW-14:700033)
This publication has 33 references indexed in Scilit:
- A Risk-Assessment Model for Cyber Attacks on Information SystemsJournal of Computers, 2010
- A comparison of security requirements engineering methodsRequirements Engineering, 2009
- SHARPE at the age of twenty twoACM SIGMETRICS Performance Evaluation Review, 2009
- Security issues in SCADA networksComputers & Security, 2006
- ISRAM: information security risk analysis methodComputers & Security, 2005
- Operationalizing IT Risk ManagementComputers & Security, 2003
- The Mobius framework and its implementationIEEE Transactions on Software Engineering, 2002
- Petri-Net Models for Risk Analysis of Hazardous Liquid Loading OperationsIndustrial & Engineering Chemistry Research, 2002
- Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information TechnologyMIS Quarterly, 1989
- On The Quantitative Definition of RiskRisk Analysis, 1981