<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Petya Ivanova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Modelling Extreme Events for the Purposes of Security Foresight</style></title><secondary-title><style face="normal" font="default" size="100%">Radioelectronic and Computer Systems</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">agent models</style></keyword><keyword><style  face="normal" font="default" size="100%">Black Swan theory</style></keyword><keyword><style  face="normal" font="default" size="100%">Catastrophe Loss Models</style></keyword><keyword><style  face="normal" font="default" size="100%">complexity studies</style></keyword><keyword><style  face="normal" font="default" size="100%">dynamic modelling</style></keyword><keyword><style  face="normal" font="default" size="100%">Extreme Value Theory</style></keyword><keyword><style  face="normal" font="default" size="100%">planning.</style></keyword><keyword><style  face="normal" font="default" size="100%">security policy</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">May 2012</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%"> Radioelectronic and Computer Systems 7(59)</style></publisher><pub-location><style face="normal" font="default" size="100%">Sevastopol, Ukraine</style></pub-location><pages><style face="normal" font="default" size="100%">253-259</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The risk management approach is used increasingly in modern security planning. In this approach, planners attempt to assess the likelihood of an event and the potential loss if the event occurs, and then to select certain measures that minimise an integral criteria of risk over some set of events. However, certain events of low probability but high potential impact, referred to as ‘extreme’ or ‘catastrophic’ events, need to be treated dif-ferently than those with a low potential loss and a high likelihood of occurring. This paper presents a brief overview of six ‘methods’ that have been used in addressing security-related risk management tasks—extreme value theory, catastrophe loss models, black swan theory, dynamic modelling, agent models, and complexity studies—and provides examples. It presents a summary on areas of implementation and underlines the limita-tions of established risk management approaches.</style></abstract><issue><style face="normal" font="default" size="100%">59</style></issue></record></records></xml>