Skip to main content

Advances, Systems and Applications

Journal of Cloud Computing Cover Image

Table 1 Assessment to the security risk assessment method

From: A security event description of intelligent applications in edge-cloud environment

NameTSOACARMTPASO
ATAeasylowsmallQualitativelow
FTAeasylowsmallQualitativelow
FMECAmediummediumsmallQualitativelow
HAZOPeasymediummediumQualitativelow
Petri-netdifficultmediummediumQuantitativelow
AHPeasylowmediumComprehensivehigh
CRAMMdifficulthighwideQuantitativelowUK
OCTAVEYdifficultlowwideComprehensivehighCMU
COBRAYmediummediumwideQualitativehighC&A
COBITYdifficultmediumwideQualitativehighISAKA
CORASYmediummediumwideComprehensivehighEU