CRITICAL ENERGY INFRASTRUCTURE SURVIVABILITY , INHERENT LIMITATIONS
暂无分享,去创建一个
T. Potok | A. Krings | P. Oman | F. Sheldon
[1] Robin M. Ruefle,et al. State of the Practice of Computer Security Incident Response Teams (CSIRTs) , 2003 .
[2] Thomas E. Potok,et al. An ontology-based software agent system case study , 2003, Proceedings ITCC 2003. International Conference on Information Technology: Coding and Computing.
[3] Axel W. Krings,et al. Secure and survivable software systems , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[4] Axel W. Krings,et al. A simple GSPN for modelling common mode failures in critical infrastructures , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[5] Thomas E. Potok,et al. Suitability of Agent-Based Systems for Command and Control in Fault-Tolerant, Safety-Critical Responsive Decision Networks , 2003, ISCA PDCS.
[6] Frederick T. Sheldon,et al. Modeling with Stochastic Message Sequence Charts , 2003 .
[7] Axel W. Krings,et al. Assessing Power Substation Network Security and Survivability: A Work in Progress Report , 2003, Security and Management.
[8] Thomas E. Potok,et al. VIPAR: Advanced Information Agents discovering knowledge in an open and changing environment , 2003 .
[9] Thomas E. Potok,et al. ENERGY INFRASTRUCTURE SURVIVABILITY, INHERENT LIMITATIONS, OBSTACLES AND MITIGATION STRATEGIES , 2003 .
[10] Axel W. Krings,et al. On the performance of a survivability architecture for networked computing systems , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[11] Stefan Greiner,et al. Examining Coincident Failures and Usage Profiles in Reliability Analysis of an Embedded Vehicle Sub-System , 2002, ESM.
[12] Frederick T. Sheldon,et al. Metrics for maintainability of class inheritance hierarchies , 2002, J. Softw. Maintenance Res. Pract..
[13] Jim Alves-Foss,et al. Risk Analysis and Probabilistic Survivability Assessment ( RAPSA ) : An Assessment Approach for Power Substation Hardening , 2002 .
[14] Jim Alves-Foss,et al. Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack , 2002 .
[15] Stefan Greiner,et al. Specification, safety and reliability analysis using stochastic Petri net models , 2000, Tenth International Workshop on Software Specification and Design. IWSSD-10 2000.
[16] Jonathan Jacky,et al. The Way of Z: Practical Programming with Formal Methods , 1996 .
[17] Krishna M. Kavi,et al. Reliability measurement: from theory to practice , 1992, IEEE Software.
[18] N. Hanebutte,et al. Considering Attack Complexity : Layered Intrusion Tolerance , .