Keyphrases
Attack Defense
13%
Attack Scenario
13%
Attack Tree
14%
Autonomous Spacecraft
17%
Bayesian Network
29%
Bayesian Network Inference
11%
Bayesian Network Model
16%
Continuous Time Bayesian Networks
55%
Continuous-time
11%
Control Architecture
11%
Critical Infrastructure
15%
Customizable
19%
Cyber-attacks
23%
Cybersecurity Model
11%
Decision Networks
27%
Dependable Systems
17%
Diagnostic Analysis
10%
Distributed Energy Resources
20%
Dynamic Bayesian Network
78%
Dynamic Fault Tree
36%
Dynamic Reliability
24%
Fault Detection
22%
Fault Identification
18%
Fault Recovery
18%
Fault Tree
60%
Fault Tree Analysis
11%
Generalized Stochastic Petri Nets
22%
Inference Algorithms
17%
Mean-field Analysis
11%
Multi-formalism
14%
Network Analysis
11%
Network Model
12%
Non-deterministic
17%
Optimal Repair
18%
Parametric Faults
19%
Petri Nets
19%
Posterior Probability
13%
Predictive Analysis
10%
Probabilistic Graphical Models
12%
Quantitative Evaluation
11%
Reliability Analysis
26%
Repair Strategy
17%
Repairable Fault Tree
25%
Resource Control
14%
Stochastic Activity Networks
14%
System Components
12%
System Modeling
15%
System Unreliability
14%
Transition Rates
10%
Tree Model
13%
Computer Science
Activity Network
15%
Analysis Capability
17%
Anomaly Detection
5%
Autonomous System
7%
Bayesian Networks
76%
binary decision diagram
8%
Boolean Combination
8%
Case Study
22%
class diagram
11%
Context Information
5%
Continuous Time
42%
Critical Infrastructure
11%
Cyber Attack
17%
Cyberattack
17%
Cybersecurity
17%
Data Definition Language
5%
Decision Node
6%
Density Functional Theory
11%
Dependability Analysis
9%
Dependable System
17%
Dynamic Bayesian Network
69%
Dynamic Decision
5%
Early Detection
5%
Fault detection
24%
Fault Tree
100%
Formal Specification
5%
Graphical Model
10%
Graphical User Interface
11%
Index Systems
7%
Markov Decision Process
7%
Monitoring System
8%
Network Control
13%
Network Inference
7%
Open Architecture
7%
Petri Net
22%
Physical Infrastructure
5%
Posterior Probability
10%
Probabilistic Analysis
10%
Quantitative Evaluation
11%
Reference Model
11%
Security Analytics
5%
Software Development Tool
18%
State Space
13%
State Transition
5%
Stochastic Petri Net
17%
System Behavior
6%
Technology Environment
5%
Theoretic Analysis
8%
Transition Rate
8%
Value Node
6%