Systems under attack-survivability rather than reliability: Concept, results, and applications
暂无分享,去创建一个
[1] Kjell Hausken. Strategic defense and attack for series and parallel reliability systems , 2008, Eur. J. Oper. Res..
[2] Suleyman Kondakci. Analysis of information security reliability: A tutorial , 2015, Reliab. Eng. Syst. Saf..
[3] C. Zhang,et al. A two-stage resource allocation model for lifeline systems quick response with vulnerability analysis , 2016, Eur. J. Oper. Res..
[4] M. Naceur Azaiez. A Bayesian Model for a Game of Information in Optimal Attack/Defense Strategies , 2009 .
[5] Inmaculada Rodríguez Martín,et al. A branch-and-cut algorithm for two-level survivable network design problems , 2016, Comput. Oper. Res..
[6] Vicki M. Bier,et al. Protection of simple series and parallel systems with components of different values , 2005, Reliab. Eng. Syst. Saf..
[7] Kjell Hausken,et al. Protection vs. redundancy in homogeneous parallel systems , 2008, Reliab. Eng. Syst. Saf..
[8] Kjell Hausken and Gregory Levitin. Review of Systems Defense and Attack Models , 2012, International Journal of Performability Engineering.
[9] M. Naceur Azaiez,et al. Optimal resource allocation for security in reliability systems , 2007, Eur. J. Oper. Res..
[10] Jing Zhang,et al. The impacts of adaptive attacking and defending strategies on mitigation of intentional threats , 2010, Kybernetes.
[11] Vicki M. Bier,et al. Optimal Allocation of Resources for Defense of Simple Series and Parallel Systems from Determined Adversaries , 2003 .
[12] Mehdi Mrad,et al. System Survivability in Networks in the Context of Defense/Attack Strategies: The Large Scale , 2015 .
[13] Seth D. Guikema,et al. Game Theory Models of Intelligent Actors in Reliability Analysis: An Overview of the State of the Art , 2009 .
[14] Michael G.H. Bell,et al. Improving Reliability through Multi-Path Routing and Link Defence: An Application of Game Theory to Transport , 2009 .
[15] Mohamed Naceur Azaiez,et al. Minimizing Expected Attacking Cost in Networks , 2010, Electron. Notes Discret. Math..
[16] David W. Coit,et al. Data survivability vs. security in information systems , 2012, Reliab. Eng. Syst. Saf..
[17] Gregory Levitin,et al. Resource distribution in multiple attacks with imperfect detection of the attack outcome. , 2012, Risk analysis : an official publication of the Society for Risk Analysis.
[18] David L. Banks,et al. Adversarial Risk Analysis : Analyses of Borel Games , 2011 .
[19] Gregory Levitin,et al. Parallel systems under two sequential attacks , 2009, Reliab. Eng. Syst. Saf..
[20] Gregory Levitin and Kjell Hausken. K-Round Duel with Uneven Resource Distribution , 2012 .
[21] Yogesh Kumar Agarwal,et al. Near optimal design of wavelength routed optical networks , 2016, Eur. J. Oper. Res..
[22] Jiang Lu,et al. Robust Cyber-Physical Systems: Concept, models, and implementation , 2016, Future Gener. Comput. Syst..
[23] Kjell Hausken,et al. Governments' and Terrorists' Defense and Attack in a T-Period Game , 2011, Decis. Anal..
[24] Gregory Levitin,et al. Shield versus sword resource distribution in K-round duels , 2011, Central Eur. J. Oper. Res..
[25] Abdullah Konak,et al. A Game-Theoretic Genetic Algorithm for the reliable server assignment problem under attacks , 2015, Comput. Ind. Eng..
[26] Oguzhan Alagöz,et al. Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..
[27] Gregory Levitin,et al. Minmax defense strategy for complex multi-state systems , 2009, Reliab. Eng. Syst. Saf..
[28] Ling Rothrock,et al. Systematic analysis of framing bias in missile defense: Implications toward visualization design , 2007, Eur. J. Oper. Res..
[29] Inna Pivkina,et al. Proactively applied encryption in multipath networks , 2016, Comput. Secur..
[30] Nancy R. Mead,et al. Survivable Network Systems: An Emerging Discipline , 1997 .
[31] Alan T. Murray,et al. Modeling s-t path availability to support disaster vulnerability assessment of network infrastructure , 2010, Comput. Oper. Res..
[32] Young-Soo Myung,et al. A cutting plane algorithm for computing k , 2004, Eur. J. Oper. Res..
[33] Gregory Levitin,et al. Resource Distribution in Multiple Attacks Against a Single Target , 2010, Risk analysis : an official publication of the Society for Risk Analysis.
[34] George E Apostolakis,et al. A Screening Methodology for the Identification and Ranking of Infrastructure Vulnerabilities Due to Terrorism , 2005, Risk analysis : an official publication of the Society for Risk Analysis.
[35] Maria Paola Scaparra,et al. Optimizing dynamic investment decisions for railway systems protection , 2016, Eur. J. Oper. Res..
[36] Youan Zhang,et al. Cooperative simultaneous attack of multi-missiles under unreliable and noisy communication network: A consensus scheme of impact time , 2015 .
[37] Charles E Ebeling,et al. An Introduction to Reliability and Maintainability Engineering , 1996 .
[38] Alan T. Murray,et al. Critical network infrastructure analysis: interdiction and system flow , 2007, J. Geogr. Syst..
[39] Louis Anthony Tony Cox,et al. Making Telecommunications Networks Resilient against Terrorist Attacks , 2009 .
[40] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..