(V) 4 terms
PDF Excel JSON
A A B B C C D D E E F F G G H H I I J J K K L L M M N N O O P P Q Q R R S S T T U U V W X Y Z
Owned All
Term (Ascending) Term (Descending) Creation date (Ascending) Creation date (Descending) Creator (Ascending) Creator (Descending) Term Definition Abbreviations Synonyms Labels
 | 

Validation

Created Jan 12, 2021 (14:53) by Unknown User (Helen Gardner)

Model validation substantiates a computerized model such that the model provides satisfactory accuracy consistent with the intended application of the model.

Verification

Created Nov 1, 2018 (00:00) by Jong Lee

Model verification ensures that a computerized model and its implemenation represent a mathematical model.

Vulnerability

Created Aug 12, 2020 (00:00) by Unknown User (Elizabeth Bittel)

General "The vulnerability concept is used to characterize a system’s lack of robustness or resilience with respect to various threats, both within and outside the boundaries of the system. It describe[s] the properties of an industrial system that may weaken its ability to survive and perform its mission in the presence of threats. The properties of an industrial system; its premises, facilities, and production equipment, including its human resources, human organization and all its software, hardware, and net-ware, that may weaken or limit its ability to endure threats and survive accidental events that originate both within and outside the system boundaries." (Einarsson and Rausand 1998: 535-36) [Einarsson, S., & Rausand, M. (1998). An approach to vulnerability analysis of complex industrial systems. Risk analysis, 18(5), 535-546.]

Vulnerability Modeling

Created Aug 12, 2020 (00:00) by Unknown User (Helen Gardner)

Critical-Infrastructure "A modeling approach that specifies the three main aspects involved in effective physical protection of a system: (i) attacks; (ii) assets; and (iii) protection technologies and devices." (Marrone et al. 2013; 218) [Marrone, S., Nardone, R., Tedesco, A., D'Amore, P., Vittorini, V., Setola, R., & Mazzocca, N. (2013). Vulnerability modeling and analysis for critical infrastructure protection applications. International Journal of Critical Infrastructure Protection, 6(3-4), 217-227.]