The Community for Technology Leaders
2011 41st IEEE International Symposium on Multiple-Valued Logic (2011)
Tuusula, Finland
May 23, 2011 to May 25, 2011
ISSN: 0195-623X
ISBN: 978-0-7695-4405-2
pp: 263-267
System security continues to be of increasing importance. To effectively address both natural and intentional threats to large systems, the threats must be cataloged and analyzed. Extremely large and complex systems can have an accordingly large number of threat scenarios. Simply listing the threats and devising countermeasures for each is ineffective and not efficient. We describe a threat cataloging methodology whereby a large number of threats can be efficiently cataloged and analyzed for common features. This allows countermeasures to be formulated that address a large number of threats that share common features. The methodology utilizes Multiple-Valued Logic for describing the state of a large system and a multiple-valued decision diagram (MDD) for the threat catalog and analysis.
Large System Security, Threat cataloging, MDD

T. W. Manikas, D. Y. Feinstein and M. A. Thornton, "Using Multiple-Valued Logic Decision Diagrams to Model System Threat Probabilities," 2011 41st IEEE International Symposium on Multiple-Valued Logic(ISMVL), Tuusula, Finland, 2011, pp. 263-267.
81 ms
(Ver 3.1 (10032016))