Page 38 - Read Online
P. 38
Clédel et al. J Surveill Secur Saf 2020;1:11939 I http://dx.doi.org/10.20517/jsss.2020.08 Page 139 of 139
42. Sterbenz J P G, Çetinkaya E K, Hameed M A, Jabbar A, Rohrer J P, editors. Modelling and analysis of network resilience. Proceedings of
the 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011); 2011 Jan 48; Bangalore, India.
IEEE; 2011.
43. Shirali G A, Mohammadfam I, Ebrahimipour V. A new method for quantitative assessment of resilience engineering by PCA and NT
approach: A case study in a process industry. Reliability Engineering & System Safety 2013;119:8894.
44. Haimes Y Y. On the Complex Definition of Risk: A SystemsBased Approach. Risk Anal 2009;29:164754.
45. Thompson M A, Ryan M J, Slay J, McLucas A C. A New Resilience Taxonomy. INCOSE International Symposium 2016;26:131830.
46. Abimbola M, Khan F. Resilience modeling of engineering systems using dynamic objectoriented Bayesian network approach. Computers
& Industrial Engineering 2019;130:10818.
47. Zadeh L A. Fuzzy Sets. Information and Control 1965;8:33853.
48. Muller G. Fuzzy Architecture Assessment for Critical Infrastructure Resilience. Procedia Computer Science 2012;12:36772.
49. Aleksić Al, Stefanović M, Arsovski S, Tadić D. An assessment of organizational resilience potential in SMEs of the process industry, a
fuzzy approach. J Loss Prevent Proce Industr 2013;26:123845.
50. Azadeh A, Salehi V, Arvan M, Dolatkhah M. Assessment of resilience engineering factors in highrisk environments by fuzzy cognitive
maps: A petrochemical plant. Saf Sci 2014;68:99107.
51. Clédel T, Foley S N, Cuppens N, Cuppens F, Kermarrec Y, et al. Towards the Evaluation of EndtoEnd Resilience Through External
Consistency. In: Castiglione A, Pop F, Ficco M, Palmieri F, editors. Proceedings of the 10th International Symposium on Cyberspace and
Security (CSS); 2018 Oct 2931; Amalfi, Italy. Springer; 2018. pp. 99114.
52. Clark D D, Wilson D R. A Comparison of Commercial and Military Computer Security Policies. Proceedings of the 1987 IEEE Symposium
on Security and Privacy; 1987 April 2729; Oakland, CA, USA. IEEE; 2014.
53. Williams J G, Padula L J L. Automated support for external consistency. Proceedings of the [1993] Proceedings Computer Security
Foundations Workshop VI; 1993 June 1517; Franconia, NH, USA. IEEE; 2002.
54. Wisner B, Blaikie P M, Cannon T, Davis I. At Risk: Natural Hazards, People’s Vulnerability and Disasters. 2nd ed. London: Routledge;
2004. Available from: https://books.google.fr/books?id=566bdm7T5VEC. [Last accessed on 04102020]
55. Linkov I, Eisenberg DA, Bates ME, et al. Measurable Resilience for Actionable Policy. Environ Sci Technol 2013;47:1010810110.
56. Linkov I, Eisenberg DA, Plourde K, Seager TP, Allen J, Kott A. Resilience metrics for cyber systems. Environ Syst Decis 2013;33:4716.
57. Stoller S D, Liu Y A. Algorithm Diversity for Resilient Systems. In: Foley SN, editor. Proceedings of the IFIP Annual Conference on
Data and Applications Security and Privacy; 2019 Jul 1517; Charleston, SC, USA. Springer; 2019. pp. 359378.
58. Andersen D, Balakrishnan H, Kaashoek F, Morris R. Resilient Overlay Networks. Sigcomm Comput Commun Rev 2002;32:6666.
59. Costa da Fontoura L. Reinforcing the resilience of complex networks. Phys Rev E 2004;69:066127.
60. Sousa P, Neves N F, Verissimo P, editors. How resilient are distributed f fault/intrusiontolerant systems?. Proceedings of the 2005
International Conference on Dependable Systems and Networks (DSN’05); 2005 June 28 Jul 1; Yokohama, Japan. IEEE; 2005.
61. Lucia W, Sinopoli B, Franze G, editors. A settheoretic approach for secure and resilient control of CyberPhysical Systems subject to
false data injection attacks. Proceedings of the 2016 Science of Security for CyberPhysical Systems Workshop (SOSCYPS); 2016 April
1111; Vienna, Austria. IEEE; 2016.
62. Kanoun W, CuppensBoulahia N, Cuppens F, Dubus S, editors. Riskaware Framework for Activating and Deactivating Policybased
Response Riskaware framework for activating and deactivating policybased response. Proceedings of the 2010 Fourth International
Conference on Network and System Security; 2010 Sept 13; Melbourne, VIC, Australia. IEEE; 2010.
63. Aven T. On Some Recent Definitions and Analysis Frameworks for Risk, Vulnerability, and Resilience. Risk Anal 2011;31:515522.
64. Van Mieghem P, Doerr C, Wang H, Hernandez J M, Hutchison D, et al. A framework for computing topological network robustness. Delft
University of Technology, Report 20101218, 2010.
65. Baheti R, Gill H. Cyberphysical systems. The Impact of Control Technology 2011;12:161166.
66. Lee E A, editor. Cyberphysical systemsare computing foundations adequate. Proceedings of the Position paper for NSF Workshop on
Cyberphysical Systems: Research Motivation, Techniques and Roadmap; 2006 Oct 1617; Austin, TX, USA.
67. De Florio V. Antifragility = Elasticity + Resilience + Machine Learning: Models and Algorithms for Open System Fidelity. Procedia Comput
Sci 2014;32:83441.
68. Cardenas AA, Amin S, Sinopoli B, et al. Challenges for Securing Cyber Physical Systems. 1st Workshop CyberPhys. Syst Security 2009;5:1.
69. Hayel Y, Quanyan Z, editors. Resilient and secure network design for cyber attackinduced cascading link failures in critical infrastructures.
Proceedings of the 2015 49th Annual Conference on Information Sciences and Systems (CISS); 2015 Mar 1820; Baltimore, MD, USA.
IEEE; 2015.