413
Views
5
CrossRef citations to date
0
Altmetric
Original Articles

Modeling current and emerging threats in the airport domain through adversarial risk analysis

, , &
Pages 894-912 | Received 12 Oct 2014, Accepted 28 May 2015, Published online: 28 Aug 2015

References

  • Ashford, N. J., S. Mumayiz, and P. H. Wright. 2011. Airport Engineering: Planning, Design and Development of 21st Century Airports. 4th ed. Hoboken, NJ: Wiley.10.1002/9780470950074
  • Aven, T., and O. Renn. 2009. “On Risk Defined as an Event where the Outcome is Uncertain.” Journal of Risk Research 12 (1): 1–11.10.1080/13669870802488883
  • Ayra, E. S., D. Ríos Insua, J. Cano, and F. Calle. 2015. “A Probabilistic Influence Diagram for Runway Excursion Risk Analysis.” Submitted for publication.
  • Basak, S., and A. Shapiro. 2001. “Value-at-risk-based Risk Management: Optimal Policies and Asset Prices.” Review of Financial Studies 14 (2): 371–405.10.1093/rfs/14.2.371
  • Bedford, T., and R. M. Cooke. 2001. Probabilistic Risk Analysis: Foundations and Methods. New York: Cambridge University Press.10.1017/CBO9780511813597
  • Berger, J. O. 1985. Statistical Decision Theory and Bayesian Analysis. 2nd ed. Berlin: Springer-Verlag.10.1007/978-1-4757-4286-2
  • Brandt, U. S. 2013. “The Implication of Extreme Events on Policy Responses.” Journal of Risk Research 17 (2): 221–240.
  • Cano, J., D. Ríos Insua, A. Tedeschi, and U. Turhan. 2015. “Security Economics: An Adversarial Risk Analysis Approach to Airport Protection.” Annals of Operations Research. doi:10.1007/s10479-014-1690-7.
  • Carr, J. 2011. Inside Cyber Warfare: Mapping the Cyber Underworld. 2nd ed. Ebook. Sebastopol, CA: O’Reilly Media.
  • Cheung, S., U. Lindqvist, and M. W. Fong. 2003. “Modeling Multistep Cyber Attacks for Scenario Recognition”. Proceedings of DARPA, Information Survivability Conference and Exposition 1: 284–292.
  • Čokorilo, O., M. De Luca, and G. Dell’Acqua. 2014. “Aircraft Safety Analysis Using Clustering Algorithms.” Journal of Risk Research 17 (10): 1325–1340.10.1080/13669877.2013.879493
  • Coles, S. 2001. An Introduction to Statistical Modeling of Extreme Values. London: Springer-Verlag.10.1007/978-1-4471-3675-0
  • Eurocontrol: Directorate Single Sky. 2012. Manual for National ATM Security Oversight. Report Number DSS/CM/SEC/DEL/12-044. Brussels: Eurocontrol.
  • Eurocontrol: EATM. 2008. ICT Security Guidance Material. Edition 1.0. Brussels: Eurocontrol.
  • Ezell, B. C., R. M. Robinson, P. Foytik, C. Jordan, and D. Flanagan. 2013. “Cyber Risk to Transportation, Industrial Control Systems, and Traffic Signal Controllers.” Environment Systems and Decisions 33 (4): 508–516.10.1007/s10669-013-9481-2
  • Feng, C. M., and C. C. Chung. 2013. “Assessing the Risks of Airport Airside through the Fuzzy Logic-Based Failure Modes, Effect, and Criticality Analysis.” Mathematical Problems in Engineering 2013: 11 pp. doi:10.1155/2013/239523. Article ID 239523.
  • French, S. 1986. Decision Theory: An Introduction to the Mathematics of Rationality. New York: Halsted Press.
  • French, S., and D. Ríos Insua. 2000. Statistical Decision Theory. London: Arnold.
  • Gopalakrishnan, K., M. Govindarasu, D. W. Jacobson, and B. M. Phares. 2013. “Cyber Security for Airports.” International Journal for Traffic and Transport Engineering 3 (4): 365–376.10.7708/2217-544X
  • Hill, A. 2001. “Media Risks: The Social Amplification of Risk and the Media Violence Debate.” Journal of Risk Research 4 (3): 209–225.10.1080/13669870152023773
  • Janczewski, L. J., and A. M. Colarik. 2008. Cyber Warfare and Cyber Terrorism. New York: Information Science Reference.
  • Kaplan, S., and B. J. Garrick. 1981. “On the Quantitative Definition of Risk.” Risk Analysis 1 (1): 11–27.10.1111/risk.1981.1.issue-1
  • Khorsandi, J., and T. Aven. 2014. “A Risk Perspective Supporting Organizational Efforts for Achieving High Reliability.” Journal of Risk Research 17 (7): 871–884.10.1080/13669877.2013.822912
  • Kundur, D., X. Feng, S. Mashayekh, S. Liu, T. Zourntos, and K. L. Butler-Purry. 2011. “Towards Modelling the Impact of Cyber Attacks on a Smart Grid.” International Journal of Security and Networks 6 (1): 2–13.10.1504/IJSN.2011.039629
  • Mercuri, R. T. 2003. “Analyzing Security Costs.” Communications of the ACM 46 (6): 15–18.10.1145/777313
  • Nai Fovino, I., L. Guidi, M. Masera, and A. Stefanini. 2011. “Cyber Security Assessment of a Power Plant.” Electric Power Systems Research 81 (2): 518–526.10.1016/j.epsr.2010.10.012
  • Pacheco, R. R., E. Fernandes, and E. M. Domingos. 2014. “Airport Airside Safety Index.” Journal of Air Transport Management 34: 86–92.10.1016/j.jairtraman.2013.08.007
  • Ríos Insua, D., J. Cano, M. Pellot, and R. Ortega. 2015a. “From Risk Analysis to Adversarial Risk Analysis”. In Current Trends in Bayesian Methodology with Applications, edited by Umesh Singh, Dipak K. Dey, Satyanshu Kumar Upadyay, and Appaia Loganathan, 313–336. Boca Raton, FL: CRC Press.
  • Ríos Insua, D., J. Cano, M. Pellot, and R. Ortega. 2015b. “Multithreat Multisite Protection: A Security Case Study.” Submitted for publication.
  • Ríos Insua, D., J. Ríos, and D. Banks. 2009. “Adversarial Risk Analysis.” Journal of the American Statistical Association 104 (486): 841–854.10.1198/jasa.2009.0155
  • Ríos, J., and D. Ríos Insua. 2012. “Adversarial Risk Analysis for Counterterrorism Modeling.” Risk Analysis 32 (5): 894–915.10.1111/j.1539-6924.2011.01713.x
  • Rippl, S. 2002. “Cultural Theory and Risk Perception: A Proposal for a Better Measurement.” Journal of Risk Research 5 (2): 147–165.10.1080/13669870110042598
  • Shameli-Sendi, A., and M. Dagenais. 2014. “ARITO: Cyber-attack Response System Using Accurate Risk Impact Tolerance.” International Journal of Information Security 13 (4): 367–390.10.1007/s10207-013-0222-9
  • Singpurwalla, N. D. 2006. Reliability and Risk: A Bayesian Perspective. West Sussex: Wiley.10.1002/9780470060346
  • Smith, A. 2011. “Airport Security – An Evolving Challenge.” International Airport Review 15 (4): 27–29.
  • Stern, J., and J. B. Wiener. 2006. “Precaution Against Terrorism.” Journal of Risk Research 9 (4): 393–447.10.1080/13669870600715750
  • Wahlberg, A. A. F., and L. Sjoberg. 2000. “Risk Perception and the Media.” Journal of Risk Research 3 (1): 31–50.10.1080/136698700376699

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.