Pub Date : 2018-05-30DOI: 10.1007/978-3-319-77492-3_14
A. Rose, N. Miller, Jonathan Eyer, Josh Banks
{"title":"Economic Effectiveness of Mitigation and Resilience","authors":"A. Rose, N. Miller, Jonathan Eyer, Josh Banks","doi":"10.1007/978-3-319-77492-3_14","DOIUrl":"https://doi.org/10.1007/978-3-319-77492-3_14","url":null,"abstract":"","PeriodicalId":255663,"journal":{"name":"Cyber Resilience of Systems and Networks","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124032856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-30DOI: 10.1007/978-3-319-77492-3_5
Nathaniel Evans, W. Horsthemke
{"title":"Analysis of Dependencies","authors":"Nathaniel Evans, W. Horsthemke","doi":"10.1007/978-3-319-77492-3_5","DOIUrl":"https://doi.org/10.1007/978-3-319-77492-3_5","url":null,"abstract":"","PeriodicalId":255663,"journal":{"name":"Cyber Resilience of Systems and Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132103934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-30DOI: 10.1007/978-3-319-77492-3_10
Nathaniel Evans, W. Horsthemke
{"title":"Active Defense Techniques","authors":"Nathaniel Evans, W. Horsthemke","doi":"10.1007/978-3-319-77492-3_10","DOIUrl":"https://doi.org/10.1007/978-3-319-77492-3_10","url":null,"abstract":"","PeriodicalId":255663,"journal":{"name":"Cyber Resilience of Systems and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130677041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-30DOI: 10.1007/978-3-319-77492-3_9
D. Bodeau, R. Graubart
{"title":"Systems Engineering Approaches","authors":"D. Bodeau, R. Graubart","doi":"10.1007/978-3-319-77492-3_9","DOIUrl":"https://doi.org/10.1007/978-3-319-77492-3_9","url":null,"abstract":"","PeriodicalId":255663,"journal":{"name":"Cyber Resilience of Systems and Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131710307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-30DOI: 10.1007/978-3-319-77492-3_8
D. Ormrod, B. Turnbull
{"title":"Modeling and Simulation Approaches","authors":"D. Ormrod, B. Turnbull","doi":"10.1007/978-3-319-77492-3_8","DOIUrl":"https://doi.org/10.1007/978-3-319-77492-3_8","url":null,"abstract":"","PeriodicalId":255663,"journal":{"name":"Cyber Resilience of Systems and Networks","volume":"10 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133773862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-30DOI: 10.1007/978-3-319-77492-3_4
Brianna Keys, S. Shapiro
{"title":"Frameworks and Best Practices","authors":"Brianna Keys, S. Shapiro","doi":"10.1007/978-3-319-77492-3_4","DOIUrl":"https://doi.org/10.1007/978-3-319-77492-3_4","url":null,"abstract":"","PeriodicalId":255663,"journal":{"name":"Cyber Resilience of Systems and Networks","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127032251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-30DOI: 10.1007/978-3-319-77492-3_3
S. Musman, S. Agbolosu-Amison, K. Crowther
{"title":"Metrics Based on the Mission Risk Perspective","authors":"S. Musman, S. Agbolosu-Amison, K. Crowther","doi":"10.1007/978-3-319-77492-3_3","DOIUrl":"https://doi.org/10.1007/978-3-319-77492-3_3","url":null,"abstract":"","PeriodicalId":255663,"journal":{"name":"Cyber Resilience of Systems and Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129194469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-30DOI: 10.1007/978-3-319-77492-3_6
T. Moore, Jin-Hee Cho
{"title":"Applying Percolation Theory","authors":"T. Moore, Jin-Hee Cho","doi":"10.1007/978-3-319-77492-3_6","DOIUrl":"https://doi.org/10.1007/978-3-319-77492-3_6","url":null,"abstract":"","PeriodicalId":255663,"journal":{"name":"Cyber Resilience of Systems and Networks","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128054350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-30DOI: 10.1007/978-3-319-77492-3_15
Nathaniel Evans, W. Horsthemke
{"title":"Regional Critical Infrastructure","authors":"Nathaniel Evans, W. Horsthemke","doi":"10.1007/978-3-319-77492-3_15","DOIUrl":"https://doi.org/10.1007/978-3-319-77492-3_15","url":null,"abstract":"","PeriodicalId":255663,"journal":{"name":"Cyber Resilience of Systems and Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128269753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-30DOI: 10.1016/0965-8564(93)90028-j
G. Karsai, X. Koutsoukos, H. Neema, P. Volgyesi, J. Sztipanovits
{"title":"Transportation Networks","authors":"G. Karsai, X. Koutsoukos, H. Neema, P. Volgyesi, J. Sztipanovits","doi":"10.1016/0965-8564(93)90028-j","DOIUrl":"https://doi.org/10.1016/0965-8564(93)90028-j","url":null,"abstract":"","PeriodicalId":255663,"journal":{"name":"Cyber Resilience of Systems and Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128316573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}