Title
A Bayesian network methodology for optimal security management of critical infrastructures
Abstract
•A methodology for the protection of critical infrastructures based on LIMID was developed.•The methodology allows cost-effective allocation of security measures.•The developed LIMID is used to perform defend-attack-defend scenarios.•Given the security barriers, the shift in the preference of attackers can be modelled.•The methodology allowed identifying an optimal defensive strategy given an attack.
Year
DOI
Venue
2019
10.1016/j.ress.2018.03.028
Reliability Engineering & System Safety
Keywords
Field
DocType
Critical infrastructures,Security management,Limited memory influence diagram,Decision support systems,Cost-effectiveness analysis
Interdependence,Complex system,Expected utility hypothesis,Risk analysis (engineering),Influence diagram,Bayesian network,Engineering,Reliability engineering,Security management,Vulnerability
Journal
Volume
ISSN
Citations 
191
0951-8320
1
PageRank 
References 
Authors
0.37
4
4
Name
Order
Citations
PageRank
Alessio Misuri121.76
Nima Khakzad29614.14
Genserik Reniers3124.13
Valerio Cozzani443.87