The Community for Technology Leaders
2013 IEEE 43rd International Symposium on Multiple-Valued Logic (2011)
Tuusula, Finland
May 23, 2011 to May 25, 2011
ISSN: 0195-623X
ISBN: 978-0-7695-4405-2
pp: 263-267
System security continues to be of increasing importance. To effectively address both natural and intentional threats to large systems, the threats must be cataloged and analyzed. Extremely large and complex systems can have an accordingly large number of threat scenarios. Simply listing the threats and devising countermeasures for each is ineffective and not efficient. We describe a threat cataloging methodology whereby a large number of threats can be efficiently cataloged and analyzed for common features. This allows countermeasures to be formulated that address a large number of threats that share common features. The methodology utilizes Multiple-Valued Logic for describing the state of a large system and a multiple-valued decision diagram (MDD) for the threat catalog and analysis.
Large System Security, Threat cataloging, MDD
Theodore W. Manikas, David Y. Feinstein, Mitchell A. Thornton, "Using Multiple-Valued Logic Decision Diagrams to Model System Threat Probabilities", 2013 IEEE 43rd International Symposium on Multiple-Valued Logic, vol. 00, no. , pp. 263-267, 2011, doi:10.1109/ISMVL.2011.12
90 ms
(Ver 3.3 (11022016))