Page 38 - Read Online
P. 38

Clédel et al. J Surveill Secur Saf 2020;1:119­39  I http://dx.doi.org/10.20517/jsss.2020.08  Page 139 of 139



               42. Sterbenz J P G, Çetinkaya E K, Hameed M A, Jabbar A, Rohrer J P, editors. Modelling and analysis of network resilience. Proceedings of
                  the 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011); 2011 Jan 4­8; Bangalore, India.
                  IEEE; 2011.
               43. Shirali G A, Mohammadfam I, Ebrahimipour V. A new method for quantitative assessment of resilience engineering by PCA and NT
                  approach: A case study in a process industry. Reliability Engineering & System Safety 2013;119:88­94.
               44. Haimes Y Y. On the Complex Definition of Risk: A Systems­Based Approach. Risk Anal 2009;29:1647­54.
               45. Thompson M A, Ryan M J, Slay J, McLucas A C. A New Resilience Taxonomy. INCOSE International Symposium 2016;26:1318­30.
               46. Abimbola M, Khan F. Resilience modeling of engineering systems using dynamic object­oriented Bayesian network approach. Computers
                  & Industrial Engineering 2019;130:108­18.
               47. Zadeh L A. Fuzzy Sets. Information and Control 1965;8:338­53.
               48. Muller G. Fuzzy Architecture Assessment for Critical Infrastructure Resilience. Procedia Computer Science 2012;12:367­72.
               49. Aleksić Al, Stefanović M, Arsovski S, Tadić D. An assessment of organizational resilience potential in SMEs of the process industry, a
                  fuzzy approach. J Loss Prevent Proce Industr 2013;26:1238­45.
               50. Azadeh A, Salehi V, Arvan M, Dolatkhah M. Assessment of resilience engineering factors in high­risk environments by fuzzy cognitive
                  maps: A petrochemical plant. Saf Sci 2014;68:99­107.
               51. Clédel T, Foley S N, Cuppens N, Cuppens F, Kermarrec Y, et al. Towards the Evaluation of End­to­End Resilience Through External
                  Consistency. In: Castiglione A, Pop F, Ficco M, Palmieri F, editors. Proceedings of the 10th International Symposium on Cyberspace and
                  Security (CSS); 2018 Oct 29­31; Amalfi, Italy. Springer; 2018. pp. 99­114.
               52. Clark D D, Wilson D R. A Comparison of Commercial and Military Computer Security Policies. Proceedings of the 1987 IEEE Symposium
                  on Security and Privacy; 1987 April 27­29; Oakland, CA, USA. IEEE; 2014.
               53. Williams J G, Padula L J L. Automated support for external consistency. Proceedings of the [1993] Proceedings Computer Security
                  Foundations Workshop VI; 1993 June 15­17; Franconia, NH, USA. IEEE; 2002.
               54. Wisner B, Blaikie P M, Cannon T, Davis I. At Risk: Natural Hazards, People’s Vulnerability and Disasters. 2nd ed. London: Routledge;
                  2004. Available from: https://books.google.fr/books?id=566bdm7T5VEC. [Last accessed on 04­10­2020]
               55. Linkov I, Eisenberg DA, Bates ME, et al. Measurable Resilience for Actionable Policy. Environ Sci Technol 2013;47:10108­10110.
               56. Linkov I, Eisenberg DA, Plourde K, Seager TP, Allen J, Kott A. Resilience metrics for cyber systems. Environ Syst Decis 2013;33:471­6.
               57. Stoller S D, Liu Y A. Algorithm Diversity for Resilient Systems. In: Foley SN, editor. Proceedings of the IFIP Annual Conference on
                  Data and Applications Security and Privacy; 2019 Jul 15­17; Charleston, SC, USA. Springer; 2019. pp. 359­378.
               58. Andersen D, Balakrishnan H, Kaashoek F, Morris R. Resilient Overlay Networks. Sigcomm Comput Commun Rev 2002;32:66­66.
               59. Costa da Fontoura L. Reinforcing the resilience of complex networks. Phys Rev E 2004;69:066127.
               60. Sousa P, Neves N F, Verissimo P, editors. How resilient are distributed f fault/intrusion­tolerant systems?. Proceedings of the 2005
                  International Conference on Dependable Systems and Networks (DSN’05); 2005 June 28 ­ Jul 1; Yokohama, Japan. IEEE; 2005.
               61. Lucia W, Sinopoli B, Franze G, editors. A set­theoretic approach for secure and resilient control of Cyber­Physical Systems subject to
                  false data injection attacks. Proceedings of the 2016 Science of Security for Cyber­Physical Systems Workshop (SOSCYPS); 2016 April
                  11­11; Vienna, Austria. IEEE; 2016.
               62. Kanoun W, Cuppens­Boulahia N, Cuppens F, Dubus S, editors. Risk­aware Framework for Activating and Deactivating Policy­based
                  Response Risk­aware framework for activating and deactivating policy­based response. Proceedings of the 2010 Fourth International
                  Conference on Network and System Security; 2010 Sept 1­3; Melbourne, VIC, Australia. IEEE; 2010.
               63. Aven T. On Some Recent Definitions and Analysis Frameworks for Risk, Vulnerability, and Resilience. Risk Anal 2011;31:515­522.
               64. Van Mieghem P, Doerr C, Wang H, Hernandez J M, Hutchison D, et al. A framework for computing topological network robustness. Delft
                  University of Technology, Report 20101218, 2010.
               65. Baheti R, Gill H. Cyber­physical systems. The Impact of Control Technology 2011;12:161­166.
               66. Lee E A, editor. Cyber­physical systems­are computing foundations adequate. Proceedings of the Position paper for NSF Workshop on
                  Cyber­physical Systems: Research Motivation, Techniques and Roadmap; 2006 Oct 16­17; Austin, TX, USA.
               67. De Florio V. Antifragility = Elasticity + Resilience + Machine Learning: Models and Algorithms for Open System Fidelity. Procedia Comput
                  Sci 2014;32:834­41.
               68. Cardenas AA, Amin S, Sinopoli B, et al. Challenges for Securing Cyber Physical Systems. 1st Workshop CyberPhys. Syst Security 2009;5:1.
               69. Hayel Y, Quanyan Z, editors. Resilient and secure network design for cyber attack­induced cascading link failures in critical infrastructures.
                  Proceedings of the 2015 49th Annual Conference on Information Sciences and Systems (CISS); 2015 Mar 18­20; Baltimore, MD, USA.
                  IEEE; 2015.
   33   34   35   36   37   38   39   40   41   42   43