attack trees
Recently Published Documents


TOTAL DOCUMENTS

123
(FIVE YEARS 40)

H-INDEX

21
(FIVE YEARS 2)

Author(s):  
Aliyu Tanko Ali ◽  
Damas Gruska
Keyword(s):  

2021 ◽  
Vol 182 (1) ◽  
pp. 69-94
Author(s):  
Étienne André ◽  
Didier Lime ◽  
Mathias Ramparison ◽  
Mariëlle Stoelinga

Risk assessment of cyber-physical systems, such as power plants, connected devices and IT-infrastructures has always been challenging: safety (i. e., absence of unintentional failures) and security (i. e., no disruptions due to attackers) are conditions that must be guaranteed. One of the traditional tools used to consider these problems is attack trees, a tree-based formalism inspired by fault trees, a well-known formalism used in safety engineering. In this paper we define and implement the translation of attack-fault trees (AFTs) to a new extension of timed automata, called parametric weighted timed automata. This allows us to parameterize constants such as time and discrete costs in an AFT and then, using the model-checker IMITATOR, to compute the set of parameter values such that a successful attack is possible. Moreover, we add the possibility to define counter-measures. Using the different sets of parameter values computed, different attack and fault scenarios can be deduced depending on the budget, time or computation power of the attacker, providing helpful data to select the most efficient counter-measure.


2021 ◽  
Vol 67 (2) ◽  
pp. 91-107
Author(s):  
Michal Lalík ◽  
Juraj Galko ◽  
Andrej Kunca ◽  
Christo Nikolov ◽  
Slavomír Rell ◽  
...  

Abstract Coniferous forests in Europe have a considerable number of pests that attack trees of all ages from youngest up to oldest ones. One of them is the large pine weevil Hylobius abietis. This species is widespread in Europe and occurs from warm southern areas (Spain) up to northern countries (Sweden, Finland). Larvae of this species do not cause damage, they help in the decomposition process of stumps and roots. Adults are harmful as they consume bark of young coniferous seedlings, above all of spruce and pine. One adult can consume on average 75 mm2 of bark per day. Individuals can live up to 4 years, and during their lives they can damage and kill several tens of coniferous seedlings. Traditional chemical protection of seedlings against this pest is and will gradually be more and more restricted or forbidden. In this review, we describe this method as well as all other alternative methods including biological protection. We estimate that H. abietis causes annual damages in Europe of almost 120 million € and damages several tens of thousands of hectares of young forest stands.


Information ◽  
2021 ◽  
Vol 12 (4) ◽  
pp. 175
Author(s):  
Daniele Codetta-Raiteri

Fault Trees are well-known models for the reliability analysis of systems, used to compute several kinds of qualitative and quantitative measures, such as minimal cut-sets, system failure probability, sensitivity (importance) indices, etc [...]


2021 ◽  
pp. 457-467
Author(s):  
Carlos E. Budde ◽  
Christina Kolb ◽  
Mariëlle Stoelinga
Keyword(s):  

2020 ◽  
Vol 6 (2) ◽  
pp. 47-55
Author(s):  
Meidoraeka Rigine Tambunan ◽  
Reza Raihandhany

Parasitic plants are a group of plants that live and have a broad ecological distribution which in general attack trees, shrubs or herbs to be used as a host. Some parasitic plants attacked some plants in Institut Teknologi Bandung (ITB) Ganesha Campus, Bandung. Exploration and collection of these parasitic plants in this area are conducted. Three parasitic plants species, such as Cuscuta australis, Scurrula parasitica, and Dendrophthoe pentandra are recorded and they attack 7 other plants species in ITB Ganesha. S. parasitica is reported as the highest population species to parasiting 5 plants species, while C. australis only parasiting 3 plants species and D. pendantra is parasiting 4 plants.


2020 ◽  
Vol 3 (1) ◽  
pp. 1-12
Author(s):  
So-Hyeon Cho ◽  
Dong-Seok Kang ◽  
Min-Song Kang ◽  
Hyeon-Soo Kim ◽  
Jin-Woong Bae ◽  
...  

In the era of agriculture 4.0, cutting-edge technologies including Information and communication technology (ICT) is being introduced into traditional agriculture. As farm intelligence emerges as a key area of smart agriculture, the scope of agriculture has expanded from the seed industry to distribution and logistics, however the area that is still most directly connected to the physical agricultural environment is smart farming. Cybersecurity incidents or cybercrimes in smart farming can directly damage crops and harm human safety. Research on individual technical elements that constitute smart farming has been ongoing for a long time relatively, however it has not been long since the work of systematically identifying and classifying threats to smart agriculture as a whole. In this study, STRIDE threat modeling is used to identify cyber threats to greenhouse and make system design more robust. Through this work, we have derived 126 threats and have created 4 types of attack trees. It will be the basis to allow systematic threat classification more clearly in smart greenhouse.


Sign in / Sign up

Export Citation Format

Share Document