نتایج جستجو برای: interdependent security

تعداد نتایج: 185170  

2012
Aron Laszka Mark Felegyhazi Levente Buttyán

Risks faced by information system operators and users are not only determined by their own security posture, but are also heavily affected by the security-related decisions of others. This interdependence between information system operators and users is a fundamental property that shapes the efficiency of security defense solutions. Game theory is the most appropriate method to model the strat...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1391

peace and national security protection and ironic solving of international conflicts become the preliminary foundation of the united nations charter and had been considered as the main responsibilities of the security council, after world war ii and the establishment of united nations organization. therefore, the security council enables to analyze every kind of conflicts and challenges which ...

Journal: :Automatica 2013
Saurabh Amin Galina Schwartz S. Shankar Sastry

This article studies security decisions of identical plant-controller systems, when their security is interdependent due to network induced risks. Each plant is modeled by a discrete-time stochastic linear system, with the systems controlled over a shared communication network. We formulate the problem of security choices of the individual system operators (also called players) as a non-coopera...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...

2006
Jun Zhuang Vicki M. Bier

Optimizing resource allocation in interdependent security problems is a serious challenge for U.S. homeland security. In this paper, game theory is applied to this challenge in the case where investment by one defender has positive externalities for other players. The phenomena of tipping and cascading are discussed, and we explore how to target subsidized security in order to achieve the best ...

2012
Anatolijs Zabasta Nadezda Kunicina

This paper presents a systematic approach for computing metrics and performance indices of interdependent critical infrastructures based on their information content, expert views and risk analysis capabilities. The paper also proposes a risk-based methodology that aims to monitor interdependent services based on generic risks and assurance levels using security properties: confidentiality, int...

2012
Shuliang Wang Xueguang Chen

Infrastructure systems such as power and water supplies make up the cornerstone of modern society which is essential for the functioning of a society and its economy. They become more and more interconnected and interdependent with the development of scientific technology and social economy. Risk and vulnerability analysis of interdependent infrastructures for security considerations has become...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید