Bibliography

  1. Abrahamsen, E.B., Aven, T., Pettersen, K.A., Rosqvist, T. (2012) A framework for selection of strategy for management of security measures. Proceedings PSAM11 -ESREL2012, Helsinki.
  2. Anton, P.S., Anderson, R., Mesic, R. and Scheiern, M. (2003) The vulnerability assessment & mitigation methodology, Rand Report. ISBN 0-8330-3434-0.
  3. Apostolakis, G.E. and Lemon, D.M. (2005) A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism. Risk Analysis, 24(2), 361–376.
  4. AS/NZS. (2004) 4360, Australian/New Zealand Standard: Risk Management.
  5. Aven, T. (1992) Reliability and Risk Analysis. Elsevier, London.
  6. Aven, T. (2007a) A unified framework for risk and vulnerability analysis and management covering both safety and security. Reliability Engineering & System Safety, 92, 745–754.
  7. Aven, T. (2007b) On the ethical justification for the use of risk acceptance criteria. Risk Analysis, 27, 303–312.
  8. Aven, T. (2008) A semi-quantitative approach to risk analysis, as an alternative to QRAs. Reliability Engineering & System Safety, 93, 768–775.
  9. Aven, T. (2009a) Identification of safety and security critical systems and activities. Reliability Engineering & System Safety, 94, 404–411.
  10. Aven, T. (2009b) Safety is the antonym of risk for some perspectives of risk. Safety Science, 47, 925–930.
  11. Aven (2010a) Misconceptions of Risk. John Wiley & Sons, Ltd, Chichester.
  12. Aven, T. (2010b) On the need for restricting the probabilistic analysis in risk ...

Get Risk Analysis, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.