scholarly journals COMBINING BAYESIAN NETWORKS AND ROUGH SETS: FURTHER STEP TOWARDS REASONING ABOUT UNCERTAINTY

2014 ◽  
pp. 6-14
Author(s):  
Janusz Zalewski ◽  
Sławomir T. Wierzchoń ◽  
Henry L. Pfister

This paper discusses a combination of Bayesian belief networks and rough sets for reasoning about uncertainty. The motivation for this work is the problem with assessment of properties of software used in real-time safety-critical systems. A number of authors applied Bayesian networks for this purpose, however, their approach suffers from problems related to calculating the conditional probability distributions, when there is scarcity of experimental data. The current authors propose enhancing this method by using rough sets, which do not require knowledge of probability distributions and thus are helpful in making preliminary evaluations, especially in real-time decision making. The combination of Bayesian network and rough sets tools, Netica and Rosetta, respectively, is used to demonstrate the applicability of this method in a case study of the Australian Navy exercise.

Author(s):  
Jonathan Ostroff ◽  
Susan Gerhart ◽  
Dan Craigen ◽  
Ted Ralston ◽  
Nancy G. Leveson ◽  
...  

2021 ◽  
pp. 41-57
Author(s):  
Gregory Falco ◽  
Eric Rosenbach

The question “How do I assess our cyber risk?” addresses how to identify and characterize cyber risk unique to an organization’s critical systems, networks, and data. The chapter begins with a case study about a cyberattack on Ukraine’s electric grid. It details risk assessment for three types of critical systems: mission-critical systems, business-critical systems, and safety-critical systems. It explains the three types of networks critical to many organizations: business and administrative networks, operational and service delivery networks, and communication networks. In outlining the “CIA triad,” it shows how cyber risk can be characterized as a confidentiality, integrity, or availability issue relating to digital assets. Further, it describes how to assess the importance of different digital assets and how to prioritize them using a business impact analysis (BIA). The chapter concludes with real-world Embedded Endurance strategy lessons Rosenbach gained in Saudi Arabia in the wake of one of the world’s most destructive cyberattacks.


2007 ◽  
Vol 15 (1) ◽  
pp. 77-94 ◽  
Author(s):  
H.A. Thompson ◽  
D.N. Ramos-Hernandez ◽  
J. Fu ◽  
L. Jiang ◽  
I. Choi ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document