Risk and vulnerability analysis of critical infrastructure

Kaiyu Wan, Vangalur Alagar*

*Corresponding author for this work

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

Abstract

A nation’s Critical Infrastructures (CI) is vital to the trustworthy functioning of the economic, health care, and social sectors of the nation. Any disruption to CI will adversely affect the economy, and peaceful functioning of the government. Above all, it will adversely affect the morale and confidence of the citizens. Hence, protecting CI of a nation must be given top priority. Fundamental to protection mechanisms are risk and vulnerability analysis. Based on their outcomes protection mechanisms can be planned, designed, and implemented. In this paper we offer a concise template representation for critical assets, and explain a methodology for vulnerability assessment and risk analysis. We point out the potential role of agents, and deep learning methods in the development and commissioning of future cyber defense solutions.

Original languageEnglish
Title of host publicationIntelligent Computing Methodologies - 12th International Conference, ICIC 2016, Proceedings
EditorsAbir Hussain, Kyungsook Han, De-Shuang Huang
PublisherSpringer Verlag
Pages54-66
Number of pages13
ISBN (Print)9783319422961
DOIs
Publication statusPublished - 2016
Event12th International Conference on Intelligent Computing Methodologies, ICIC 2016 - Lanzhou, China
Duration: 2 Aug 20165 Aug 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9773
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference12th International Conference on Intelligent Computing Methodologies, ICIC 2016
Country/TerritoryChina
CityLanzhou
Period2/08/165/08/16

Keywords

  • Agent system
  • Critical infrastructure
  • Deep learning
  • Risk analysis
  • Vulnerability analysis

Fingerprint

Dive into the research topics of 'Risk and vulnerability analysis of critical infrastructure'. Together they form a unique fingerprint.

Cite this