Abstract

The paper deals with the evaluation and the selection of available software tools that can be utilized in solving problems related to the identification of the targets of malicious acts. The paper presents grant project requirements that focus on the development of methods for the target identification in the field of nuclear energy and critical infrastructure in the Czech Republic. The main requirements are related primarily to the modeling of unacceptable effects of malicious acts. Based on the project purposes, the specific requirements for software support for targets identification are defined. In the next step, the available methods and techniques such as event trees, fault trees and attack trees are introduced. After that there is a summary of available software tools focused on modeling and solving event, fault and attack trees. Individual software tools made by reputable producers are characterized in detail. Finally the paper compares the capability of available software tools with the specified requirements.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.