[Bertsekas, D. and Tsitsiklis, J. (1989). Parallel and Distributed Computation: Numerical Methods, Prentice Hall, Englewood Cliffs, NJ.]Search in Google Scholar
[EU (2016). Directive (EU) 2016/1148 of the European Parliament and of the Council of the European Union of 6 July 2016 concerning measures for a high common level of security of network and information systems across the union, Official Journal of the European Union59: L194/1–L194/30.]Search in Google Scholar
[ENISA (2013). National-level risk assessments an analysis report—Executive summary, Technical report, European Union Agency for Network and Information Security, Heraklion.]Search in Google Scholar
[Findeisen, W., Bailey, F.N., Brdyś, M., Malinowski, K., Tatjewski, P. and Woźniak, A. (1980). Control and Coordination in Hierarchical Systems, Wiley, Chichester.]Search in Google Scholar
[Frommer, A. (1991). Generalized nonlinear diagonal dominance and applications to asynchronous iterative methods, Journal of Computational and Applied Mathematics38(1): 105–124.10.1016/0377-0427(91)90164-F]Search in Google Scholar
[Haimes, Y. (2016). Risk Modeling, Assessment, and Management (4th Edition), Wiley, Hoboken, NJ.]Search in Google Scholar
[Haimes, Y., Santos, J., Crowther, K., Henry, M., Lian, C. and Yan, Z. (2007). Risk analysis in interdependent infrastructure, in E. Goetz and S. Shenoi (Eds), Critical Infrastructure Protection, Springer, Boston, MA, pp. 297–310.10.1007/978-0-387-75462-8_21]Search in Google Scholar
[Kalantarnia, M., Khan, F. and Hawboldt, K. (2009). Dynamic risk assessment using failure assessment and Bayesian theory, Journal of Loss Prevention in the Process Industries22(5): 600–606.10.1016/j.jlp.2009.04.006]Search in Google Scholar
[Karbowski, A., Malinowski, K., Szwaczyk, S. and Jaskóła, P. (2019). Critical infrastructure risk assessment using Markov chain model, Journal of Telecommunications and Information Technology2019(2): 15–20.10.26636/jtit.2019.130819]Search in Google Scholar
[Khan, F., Hashemi, S.J., Paltrinieri, N., Amyotte, P., Cozzani, V. and Reniers, G. (2016). Dynamic risk management: A contemporary approach to process safety management, Current Opinion in Chemical Engineering14: 9–17.10.1016/j.coche.2016.07.006]Search in Google Scholar
[Kołodziej, J. and Xhafa, F. (2011). Modern approaches to modeling user requirements on resource and task allocation in hierarchical computational grids, International Journal of Applied Mathematics and Computer Science21(2): 243–257, DOI: 10.2478/v10006-011-0018-x.10.2478/v10006-011-0018-x]Search in Google Scholar
[König, S., Schaberreiter, T., Rass, S. and Schauer, S. (2019). A measure for resilience of critical infrastructures, in E. Luiijf et al. (Eds), Critical Information Infrastructures Security, Springer, Cham, pp. 57–71.10.1007/978-3-030-05849-4_5]Search in Google Scholar
[Lian, C. and Haimes, Y.Y. (2006). Managing the risk of terrorism to interdependent infrastructure systems through the dynamic inoperability input–output model, Systems Engineering9(3): 241–258.10.1002/sys.20051]Search in Google Scholar
[López, Pastor, D. and Villalba, L.J.G. (2013). Dynamic risk assessment in information systems: State-of-the-art, Proceedings of the 6th International Conference on Information Technology (ICIT 2013), Amman, Jordan, pp. 1–9.]Search in Google Scholar
[Malinowski, K. and Karbowski, A. (2019). Hierarchical on-line risk assessment at national level, International Conference on Military Communications and Information Systems (ICMCIS 2019), Budva, Montenegro, pp. 1–5.]Search in Google Scholar
[Mesarović, M., Macko, D. and Takahara, Y. (1970). Theory of Multi-Level Hierarchical Systems, Academic Press, New York, NY.]Search in Google Scholar
[Naumov, S. and Kabanov, I. (2016). Dynamic framework for assessing cyber security risks in a changing environment, Proceedings of the 2016 International Conference on Information Science and Communication Technologies (ICISCT 2016), Tashkent, Uzbekistan, pp. 1–4.]Search in Google Scholar
[NIST (2012). Guide for conducting risk assessments, information security, NIST special publication 800-30, Revision 1, Technical report, US Department of Commerce, National Institute of Standards and Technology, Gaithersburg, MD.]Search in Google Scholar
[Poolsappasit, N., Dewri, R. and Ray, I. (2012). Dynamic security risk management using Bayesian attack graphs, IEEE Transactions on Dependable and Secure Computing9(1): 61–74.10.1109/TDSC.2011.34]Search in Google Scholar
[Rausand, M. (2011). Risk Assessment; Theory, Methods, and Applications, Wiley, Hoboken, NJ.10.1002/9781118281116]Search in Google Scholar
[Settanni, G., Skopik, F., Shovgenya, Y., Fiedler, R., Carolan, M., Conroy, D., Boettinger, K., Gall, M., Brost, G., Ponchel, C., Haustein, M., Kaufmann, H., Theuerkauf, K. and Olli, P. (2017). A collaborative cyber incident management system for European interconnected critical infrastructures, Journal of Information Security and Applications34(2): 166–182.10.1016/j.jisa.2016.05.005]Search in Google Scholar
[Skopik, F., Settanni, G. and Fiedler, R. (2016). A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing, Computers & Security60: 154–176.10.1016/j.cose.2016.04.003]Search in Google Scholar
[Szwed, P. and Skrzyński, P. (2014). A new lightweight method for security risk assessment based on fuzzy cognitive maps, International Journal of Applied Mathematics and Computer Science24(1): 213–225, DOI: 10.2478/amcs-2014-0016.10.2478/amcs-2014-0016]Search in Google Scholar
[Viduto, V., Maple, C., Huang, W. and López-Peréz, D. (2012). A novel risk assessment and optimization model for a multi-objective network security countermeasure selection problem, Decision Support Systems53(3): 569–610.10.1016/j.dss.2012.04.001]Search in Google Scholar
[Zhang, Q., Zhou, C., Xiong, N., Qin, Y., Li, X. and Huang, S. (2016). Multimodel-based incident prediction and risk assessment in dynamic cybesecurity protection for industrial control systems, IEEE Transactions on Systems, Man and Cybernetics46(10): 1426–1444.10.1109/TSMC.2015.2503399]Search in Google Scholar
[Zwikael, O. and Smyrk, J. (2019). Project Management: A Benefit Realisation Approach, Springer, Cham.10.1007/978-3-030-03174-9]Search in Google Scholar