The book introduces dependability (security metric) ideas, gives a general overview of the security analysis of Safety-Critical Systems (SCSs), explains why the study is necessary and defines key terms relevant to this research. It makes an effort to emphasize the significance of security in comparison to other dependability indicators and illustrates the key drivers of this research's purpose. The mathematical foundation of the security analysis process is briefly illustrated, and key mathematical terminology and concepts are presented that are crucial for the security evaluation of critical…mehr
The book introduces dependability (security metric) ideas, gives a general overview of the security analysis of Safety-Critical Systems (SCSs), explains why the study is necessary and defines key terms relevant to this research. It makes an effort to emphasize the significance of security in comparison to other dependability indicators and illustrates the key drivers of this research's purpose. The mathematical foundation of the security analysis process is briefly illustrated, and key mathematical terminology and concepts are presented that are crucial for the security evaluation of critical systems. This book's objective is to provide a thorough understanding of the security analysis process. It will be a research-focused book designed for undergraduate, graduate, and doctoral courses in software and cyber security. The fundamentals of reliability, security, metrics, and mathematical foundation have been covered in this book. Each technique's actual applications, along withbenefits and drawbacks, are also shown. Applying each technique to the various case studies serves as a demonstration of how it works. By using the many case studies of safety-critical systems, the students can also learn different analysis approaches and how to model them. Students will be able to use these tools, in particular, on a case study of their choice to analyze system security. The book includes a comparison of various strategies and appropriate recommendations for further reading on these subjects. Moreover, this book's target audience includes software professionals who are interested in security analysis.
Raj Kamal Kaur completed her Ph.D. in "Security Analysis of Safety-Critical Systems" from the Department of Computer Science & Engineering, Lovely Professional University, Phagwara, Punjab. She has a good number of publications in SCI-indexed International Journals of repute including IEEE Consumer Electronics, Elsevier, Springer (book chapter), and International Conference. She is a reviewer of some reputed journals. Lalit K. Singh received his Ph.D. degree from the Indian Institute of Technology (Banaras Hindu University). He is currently a Scientist in NPCIL-BARC, Department of Atomic Energy, Government of India, and has the distinction of working on Pressurized Heavy Water Reactors (PHWR) and Light Water Reactors (LWR). He has an illustrious career and succeeded in several critical jobs assigned to him in his illustrious career, though, each of them was challenging. His assignments over the years range from design, development, testing, IV&V, related research, and site validation of the safety-critical computer-based systems of Indian Nuclear Power Plants. He has published several research papers in journals of high impact factor such as IEEE Transactions, etc. He has been invited as chief guest, with keynote speeches, session chair, and talks at many international conferences, short-term courses, workshops & faculty development programs from many IITs, NITs & other institutes of national importance. He is supervising many PhD theses from different IITs. He is an adjunct faculty in IITs, NITs & IIITs. He is a Senior Member of IEEE and a recipient of many awards like publication awards, group achievement awards, etc. He is a member of the advisory board of various technical societies and academic committees of different institutes/universities. He is a reviewer of several SCI-indexed journals on high-impact factors. He holds 520 rank in India, in the list of world's scientists, released by AI index. Pooja Singh completed her Ph.D. from the Department of Mathematical Sciences, Indian Institute of Technology (Banaras Hindu University), Varanasi. She has a rich experience of fourteen years in mathematical modeling, stochastic processes, reliability & safety engineering for safety critical systems and worked in many domains including medical; and image processing in nuclear energy. She has published several research papers in journals. She supervises many Ph.D. students at reputed institutes. She has many reputed publications related to her field of research. She is a reviewer of many reputed journals on high-impact factors. She is a recipient of a publication award from IIT (BHU). She has completed several industrial projects. She is a member of the editorial board of many international journals and the Guest Lead editor of many special issues of international journals. She is a Senior member of IEEE. She is a life member of the Indian Nuclear Society, Department of Atomic Energy, Government of India. Ajit Kumar Verma is working as Professor (Technical Safety) since March 2012 and is with Western Norway University of Applied Sciences, Haugesund, Norway. He was Professor/Senior (HAG) Scale Professor with the Reliability Engg/Department of Electrical Engineering at IIT Bombay for around 15 years with a research focus on Reliability, Risk & Safety Engineering. He is also Guest Professor at Lulea University of Technology, Sweden, and was Adjunct at the University of Stavanger. He has been honored with 'Honorary Professor' at Amity University in India. He is Springer Book Series Editor of Asset Analytics: Performance and Safety Management as well as the Springer Book Series Editor of Reliable & Sustainable Electric Power and Energy Systems Management and has jointly edited 5 books published by Springer. He has over 250 publications in various journals and conferences and has been Supervisor/Co-supervisor for 37 Ph.D. theses.
Inhaltsangabe
Chapter 1 Introduction.- Chapter 2 Fundamentals of Safety-Critical System.- Chapter 3 Important Aspects of Cyber Security.- Chapter 4Mathematical Background.- Chapter
5 Security Analysis Models.- Chapter 6 Comparative Study of Analytical Models.- Chapter