Architecting Cyber-Secure, Resilient System-of-Systems
暂无分享,去创建一个
[1] Christoph Meinel,et al. Implementation of Cloud-RAID: A Secure and Reliable Storage above the Clouds , 2013, GPC.
[2] Arthur K. Cebrowski,et al. Network-Centric Warfare: Its Origin and Future , 1998 .
[3] Eric V. Larson,et al. Interoperability: A Continuning Challenge in Coalition Air Operations , 2001 .
[4] Clay Wilson,et al. Network Centric Warfare: Background and Oversight Issues for Congress , 2004 .
[5] J. Stradley,et al. The Electronic Part Supply Chain and Risks of Counterfeit Parts in Defense Applications , 2006, IEEE Transactions on Components and Packaging Technologies.
[6] Azad M. Madni,et al. 5.4.1 ProACT™: Process‐aware Zero Latency System for Distributed, Collaborative Enterprises , 2002 .
[7] Azad M. Madni,et al. System of Systems Integration: Key Considerations and Challenges , 2014, Syst. Eng..
[8] Sushil Jajodia,et al. Cyber Situational Awareness - Issues and Research , 2009, Cyber Situational Awareness.
[9] P. W. Singer,et al. Cybersecurity and Cyberwar: What Everyone Needs to Know® , 2013 .
[10] Rainer Böhme,et al. Security Metrics and Security Investment Models , 2010, IWSEC.
[11] Mary Baker,et al. From Nifty Gadgets to Dire Warnings , 2015, IEEE Pervasive Computing.
[12] Shane Harris,et al. @War: The Rise of the Military-Internet Complex , 2014 .
[13] Harriet Goldman,et al. Cyber resilience for mission assurance , 2011, 2011 IEEE International Conference on Technologies for Homeland Security (HST).
[14] H. Rittel,et al. Dilemmas in a general theory of planning , 1973 .
[15] Azad M. Madni,et al. Engineered Resilient Systems: A DoD Perspective , 2014, CSER.
[16] Sadie Creese,et al. Understanding Insider Threat: A Framework for Characterising Attacks , 2014, 2014 IEEE Security and Privacy Workshops.
[17] D. Dasgupta,et al. Advances in artificial immune systems , 2006, IEEE Computational Intelligence Magazine.
[18] Kamal Jabbour,et al. The Science of Mission Assurance , 2011 .
[19] J. Reason. Human error: models and management , 2000, BMJ : British Medical Journal.
[20] Ari Juels,et al. New approaches to security and availability for cloud data , 2013, CACM.
[21] Azad M. Madni,et al. Towards a Conceptual Framework for Resilience Engineering , 2009, IEEE Systems Journal.