参考文献
|
-
2. Levitin, G. and K. Hausken, Redundancy vs. protection vs. false targets for systems under attack. Reliability, IEEE Transactions on, 2009. 58(1): p. 58-68.
連結:
-
3. Li, Z., H. Liao, and D.W. Coit, A two-stage approach for multi-objective decision making with applications to system reliability optimization. Reliability Engineering & System Safety, 2009. 94(10): p. 1585-1592.
連結:
-
5. Marianne Swanson, B.G. Generally Accepted Principles and Practices for Securing Information Technology Systems. 1996. 1-57.
連結:
-
7. ISO, Information technology-Security techniques-Information security management systems-Requirements, 2005, International Organization for Standardization. p. 1-34.
連結:
-
10. ISO, Information technology - Security techniques - Code of practice for information security management 2005. p. 115.
連結:
-
12. Ken Laudon, J.L., Management Information Systems. 2008: Pearson. 1-672.
連結:
-
14. Çetinkaya, E.K., et al., Modelling communication network challenges for future internet resilience, survivability, and disruption tolerance: A simulation-based approach. Telecommunication Systems, 2011: p. 1-16.
連結:
-
15. Sterbenz, J.P.G., et al., Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines. Computer Networks, 2010. 54(8): p. 1245-1265.
連結:
-
16. Ellison, R.J. and C. Woody, Survivability Analysis Framework, 2010, DTIC Document.
連結:
-
17. Ellison, R.J., et al., Survivable network systems: An emerging discipline, 1997, DTIC Document.
連結:
-
18. Roy, S., et al. A survey of game theory as applied to network security. in System Sciences (HICSS), 2010 43rd Hawaii International Conference on. 2010. IEEE.
連結:
-
19. Barth, A., et al., A learning-based approach to reactive security. Financial Cryptography and Data Security, 2010: p. 192-206.
連結:
-
20. Storm, D. Gmail hacked by cyber-spies. Google issues security warning for state-sponsored attacks, 2012.
連結:
-
22. Schaffer, H.E., X as a service, cloud computing, and the need for good judgment. IT professional, 2009. 11(5): p. 4-5.
連結:
-
25. Ryu, C., et al., Security protection design for deception and real system regimes: A model and analysis. European Journal of Operational Research, 2010. 201(2): p. 545-556.
連結:
-
27. Edward Korczak, G.L., Survivability of systems under multiple factor impact. Reliability Engineering & System Safety, 2007. 92(2): p. 269-274.
連結:
-
28. Jose E. Ramirez-Marquez, C.M.R., Bethel A. Gebre, David W. Coit, Michael Tortorella, New insights on multi-state component criticality and importance. Reliability Engineering & System Safety, 2007. 92(12): p. 1608-1619.
連結:
-
29. Nagaraja, S. and R. Anderson, Dynamic topologies for robust scale-free networks. Bio-Inspired Computing and Communication, 2008: p. 411-426.
連結:
-
30. Tian, Z., M.J. Zuo, and H. Huang, Reliability-redundancy allocation for multi-state series-parallel systems. Reliability, IEEE Transactions on, 2008. 57(2): p. 303-310.
連結:
-
31. Cook, J.L. and J.E. Ramirez-Marquez, Reliability analysis of cluster-based ad-hoc networks. Reliability Engineering & System Safety, 2008. 93(10): p. 1512-1522.
連結:
-
32. Hausken, K., Strategic defense and attack for reliability systems. Reliability Engineering & System Safety, 2008. 93(11): p. 1740-1750.
連結:
-
34. Carroll, T.E. and D. Grosu, A game theoretic investigation of deception in network security. Security and Communication Networks, 2010. 4(10): p. 1162-1172.
連結:
-
35. Levitin, G. and K. Hausken, Meeting a demand vs. enhancing protections in homogeneous parallel systems. Reliability Engineering & System Safety, 2009. 94(11): p. 1711-1717.
連結:
-
36. Jenelius, E., J. Westin, and Å.J. Holmgren, Critical infrastructure protection under imperfect attacker perception. International Journal of Critical Infrastructure Protection, 2010. 3(1): p. 16-26.
連結:
-
37. Levitin, G. and K. Hausken, Separation in homogeneous systems with independent identical elements. European Journal of Operational Research, 2010. 203(3): p. 625-634.
連結:
-
38. Zhuang, J., V.M. Bier, and O. Alagoz, Modeling secrecy and deception in a multiple-period attacker–defender signaling game. European Journal of Operational Research, 2010. 203(2): p. 409-418.
連結:
-
39. Levitin, G. and L. Xing, Reliability and performance of multi-state systems with propagated failures having selective effect. Reliability Engineering & System Safety, 2010. 95(6): p. 655-661.
連結:
-
40. Peng, R., et al., Defending simple series and parallel systems with imperfect false targets. Reliability Engineering & System Safety, 2010. 95(6): p. 679-688.
連結:
-
41. Domingo-Ferrer, J. and Ú. González-Nicolás, Decapitation of networks with and without weights and direction: The economics of iterated attack and defense. Computer Networks, 2011. 55(1): p. 119-130.
連結:
-
42. Altunay, M., et al., Optimal response to attacks on the open science grid. Computer Networks, 2011. 55(1): p. 61-73.
連結:
-
44. Ramirez-Marquez, J.E., C.M. Rocco, and G. Levitin, Optimal network protection against diverse interdictor strategies. Reliability Engineering & System Safety, 2011. 96(3): p. 374-382.
連結:
-
45. Levitin, G., I. Gertsbakh, and Y. Shpungin, Evaluating the damage associated with intentional network disintegration. Reliability Engineering & System Safety, 2011. 96(4): p. 433-439.
連結:
-
46. Zio, E. and R. Bazzo, Level Diagrams analysis of Pareto Front for multiobjective system redundancy allocation. Reliability Engineering & System Safety, 2011. 96(5): p. 569-580.
連結:
-
47. Tian, Z. and H. Liao, Condition based maintenance optimization for multi-component systems using proportional hazards model. Reliability Engineering & System Safety, 2011. 96(5): p. 581-589.
連結:
-
48. Hausken, K. and V.M. Bier, Defending against multiple different attackers. European Journal of Operational Research, 2011. 211(2): p. 370-384.
連結:
-
49. Bier, V.M. and N.J. Haphuriwat, Trade-offs Between Target Hardening and Overarching Protection. 2011.
連結:
-
50. Levitin, G. and K. Hausken, Preventive strike vs. false targets and protection in defense strategy. Reliability Engineering & System Safety, 2011. 96(8): p. 912-924.
連結:
-
51. Tekiner-Mogulkoc, H. and D.W. Coit, System Reliability Optimization Considering Uncertainty: Minimization of the Coefficient of Variation for Series-Parallel Systems. Reliability, IEEE Transactions on, 2011. 60(3): p. 667-674.
連結:
-
52. Wang, L., et al. Optimal resource allocation for protecting system availability against random cyber attacks. in Computer Research and Development (ICCRD), 2011 3rd International Conference on. 2011. IEEE.
連結:
-
53. Levitin, G., et al., Multi-state systems with selective propagated failures and imperfect individual and group protections. Reliability Engineering & System Safety, 2011. 96(12): p. 1657-1666.
連結:
-
54. Zare Moayedi, B. and M. Abdollahi Azgomi, A game theoretic framework for evaluation of the impacts of hackers diversity on security measures. Reliability Engineering & System Safety, 2011.
連結:
-
55. Levitin, G., et al., Data survivability vs. security in information systems. Reliability Engineering & System Safety, 2012. 100: p. 19-27.
連結:
-
56. Bassiri, B. and S.S. Heydari. Network survivability in large-scale regional failure scenarios. in Proceedings of the 2nd Canadian Conference on Computer Science and Software Engineering. 2009. ACM.
連結:
-
57. Callaway, D.S., et al., Network robustness and fragility: Percolation on random graphs. Physical Review Letters, 2000. 85(25): p. 5468-5471.
連結:
-
58. Cohen, R., et al., Resilience of the Internet to random breakdowns. Physical review letters, 2000. 85(21): p. 4626-4628.
連結:
-
60. Holme, P., et al., Attack vulnerability of complex networks. Physical Review E, 2002. 65(5).
連結:
-
61. Jabbar, A., et al. Performance comparison of weather disruption-tolerant cross-layer routing algorithms. in INFOCOM 2009, IEEE. 2009. IEEE.
連結:
-
62. Laprie, J.C., K. Kanoun, and M. Kaâniche, Modelling interdependencies between the electricity and information infrastructures. Computer Safety, Reliability, and Security, 2007: p. 54-67.
連結:
-
63. Lau, F., et al. Distributed denial of service attacks. in Systems, Man, and Cybernetics, 2000 IEEE International Conference on. 2000. IEEE.
連結:
-
64. Mahajan, R., D. Wetherall, and T. Anderson, Understanding BGP misconfiguration. ACM SIGCOMM Computer Communication Review, 2002. 32(4): p. 3-16.
連結:
-
65. Markopoulou, A., et al., Characterization of failures in an operational IP backbone network. IEEE/ACM Transactions on Networking (TON), 2008. 16(4): p. 749-762.
連結:
-
66. Mase, K., How to deliver your message from/to a disaster area. Communications Magazine, IEEE, 2011. 49(1): p. 52-57.
連結:
-
69. Neumayer, S. and E. Modiano. Network reliability with geographically correlated failures. in INFOCOM, 2010 Proceedings IEEE. 2010. IEEE.
連結:
-
70. Neumayer, S., et al. Assessing the vulnerability of the fiber infrastructure to disasters. in INFOCOM 2009, IEEE. 2009. IEEE.
連結:
-
72. O'Reilly, G., et al. Critical infrastructure analysis of telecom for natural disasters. in Telecommunications Network Strategy and Planning Symposium, 2006. NETWORKS 2006. 12th International. 2006. IEEE.
連結:
-
73. Pappas, V., et al. Impact of configuration errors on DNS robustness. in ACM SIGCOMM Computer Communication Review. 2004. ACM.
連結:
-
74. Park, S.T., et al. Static and dynamic analysis of the Internet's susceptibility to faults and attacks. in INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies. 2003. IEEE.
連結:
-
76. Rak, J. and K. Walkowiak. Survivability of anycast and unicast flows under attacks on networks. in Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2010 International Congress on. 2010. IEEE.
連結:
-
78. Sterbenz, J.P.G., et al., Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation. Telecommunication Systems, 2011.
連結:
-
79. Sydney, A., et al., Characterising the robustness of complex networks. International Journal of Internet Technology and Secured Transactions, 2010. 2(3): p. 291-320.
連結:
-
80. Turner, D., et al., California fault lines: understanding the causes and impact of network failures. ACM SIGCOMM Computer Communication Review, 2010. 40(4): p. 315-326.
連結:
-
82. Hu, Y., et al. An optimal reliability allocation method for digital substation systems. in Transmission and Distribution Conference and Exposition (T&D), 2012 IEEE PES. 2012. IEEE.
連結:
-
83. Izaddoost, A. and S.S. Heydari. Analyzing network failures in disaster scenarios using a travelling wave probabilistic model. in Communications (QBSC), 2012 26th Biennial Symposium on. 2012. IEEE.
連結:
-
84. Levitin, G. and K. Hausken, Defense Resource Distribution Between Protection and Redundancy for Constant Resource Stockpiling Pace. Risk Analysis, 2011. 31(10): p. 1632-1645.
連結:
-
85. Liberatore, F., M.P. Scaparra, and M.S. Daskin, Hedging against disruptions with ripple effects in location analysis. Omega, 2012. 40(1): p. 21-30.
連結:
-
86. Ishida, Y. Immunity-based systems revisited: toward systems science for robust and adaptive engineering. in Proceedings of the International Conference on Management of Emergent Digital EcoSystems. 2011. ACM.
連結:
-
87. Eiselt, H.A. and V. Marianov, Mobile phone tower location for survival after natural disasters. European Journal of Operational Research, 2012. 216(3): p. 563-572.
連結:
-
88. Zhang, J.H., J. Li, and Z.P. Liu, Multiple-resource and multiple-depot emergency response problem considering secondary disasters. Expert Systems with Applications, 2012.
連結:
-
89. Peng, R., et al., Optimal replacement and protection strategy for parallel systems. Recent Advances in System Reliability, 2012: p. 135-144.
連結:
-
90. Kjølle, G., I. Utne, and O. Gjerde, Risk analysis of critical infrastructures emphasizing electricity supply and interdependencies. Reliability Engineering & System Safety, 2012.
連結:
-
91. Adachi, T. and B.R. Ellingwood, Serviceability of earthquake-damaged water systems: Effects of electrical power availability and power backup systems on system vulnerability. Reliability engineering & system safety, 2008. 93(1): p. 78-88.
連結:
-
92. Nojiri, D., J. Rowe, and K. Levitt. Cooperative response strategies for large scale attack mitigation. in DARPA Information Survivability Conference and Exposition, 2003. Proceedings. 2003. IEEE.
連結:
-
95. Bier, V.M. and K. Hausken, Defending and attacking a network of two arcs subject to traffic congestion. Reliability Engineering & System Safety, 2013. 112: p. 214-224.
連結:
-
96. Liu, Z. and W. Xu, Determining sink location through Zeroing-In attackers in wireless sensor networks. Wireless Networks, 2012. 18(3): p. 335-349.
連結:
-
97. Wang, L., et al., Improving System Reliability Against Rational Attacks Under Given Resources. Systems, Man, and Cybernetics: Systems, IEEE Transactions on, 2014. 44(4): p. 446-456.
連結:
-
98. Wang, J., Mitigation strategies on scale-free networks against cascading failures. Physica A: Statistical Mechanics and its Applications, 2013. 392(9): p. 2257-2264.
連結:
-
102. Wu, Y., B. Wang, and K.R. Liu. Optimal defense against jamming attacks in cognitive radio networks using the Markov decision process approach. in Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE. 2010. IEEE.
連結:
-
104. Wang, J., Robustness of complex networks with the local protection strategy against cascading failures. Safety Science, 2013. 53: p. 219-225.
連結:
-
105. Yallouz, J. and A. Orda. Tunable QoS-aware network survivability. in INFOCOM, 2013 Proceedings IEEE. 2013. IEEE.
連結:
-
106. Fandel, G., A. Giese, and B. Mohn, Measuring Synergy Effects of a Public Social Private Partnership (PSPP) Project. International Journal of Production Economics, 2012.
連結:
-
107. Hirshleifer, J., Conflict and rent-seeking success functions: Ratio vs. difference models of relative success. Public Choice, 1989. 63(2): p. 101-112.
連結:
-
108. Skaperdas, S., Contest success functions. Economic Theory, 1996. 7(2): p. 283-290.
連結:
-
109. Hirshleifer, J., The Paradox of Power. Economics & Politics, 1991. 3(3): p. 177-200.
連結:
-
110. Hausken, K. and G. Levitin, Protection vs. false targets in series systems. Reliability Engineering & System Safety, 2009. 94(5): p. 973-981.
連結:
-
111. Weiss, E.S., R.M. Anderson, and R.D. Lasker, Making the most of collaboration: exploring the relationship between partnership synergy and partnership functioning. Health Education & Behavior, 2002. 29(6): p. 683-698.
連結:
-
112. Cohen, R., L. Katzir, and D. Raz, An efficient approximation for the generalized assignment problem. Information Processing Letters, 2006. 100(4): p. 162-166.
連結:
-
113. Powell, W.B., Approximate Dynamic Programming: Solving the curses of dimensionality. Vol. 703. 2007: Wiley-Interscience.
連結:
-
114. Bertsekas, D.P., et al., Dynamic programming and optimal control. Vol. 1. 1995: Athena Scientific Belmont, MA.
連結:
-
1. Alison Cartlidge, A.H., Colin Rudd, Ivor Macfarlane, John Windebank, Stuart Rance An Introductory Overview of ITIL® V3. 2007. 56.
-
4. Crawford, D., Fiber optic cable dig-ups: Causes and cures. Proc. Network Reliability: A Report to the Nation–Compendium of Technical Papers, National Engineering Consortium, 1993.
-
6. Gary Stoneburner, A.G., and Alexis Feringa Risk Management Guide for Information Technology Systems. Recommendations of the National Institute of Standards and Technology, 2002. 1-41.
-
8. IEC, Dependability management - Part 3: Application guide - Section 9: Risk analysis of technological systems, 1995, International Engineering Consortium. p. 1-67.
-
9. ISO, Risk management — Vocabulary, 2009.
-
11. Risk management. 2012 [cited 2012; Available from: http://en.wikipedia.org/wiki/Risk_management.
-
13. Lipson, H.F. and D.A. Fisher. Survivability—a new technical and business perspective on security. in Proceedings of the 1999 workshop on New security paradigms. 1999. ACM.
-
21. InformationSecurityMediaGroup, Report: Obama Ordered Stuxnet Assault, in First Time U.S. Repeatedly Used Code to Cripple Infrastructure2012.
-
23. Zscaler. Web Security Suites. 2011; Available from: http://www.zscaler.com/productsataglance.html.
-
24. TrendMicro. Trend Micro Deep Security. 2011; Available from: http://tw.trendmicro.com/tw/products/enterprise/deep-security/index.html.
-
26. Webster, J. and R.T. Watson, Analyzing the past to prepare for the future: Writing a literature review. MIS Quarterly, 2002. 26(2): p. 10.
-
33. Idika, N.C., B.H. Marshall, and B.K. Bhargava. Maximizing network security given a limited budget. in The Fifth Richard Tapia Celebration of Diversity in Computing Conference: Intellect, Initiatives, Insight, and Innovations. 2009. ACM.
-
43. Li, R., X. Wang, and X. Jiang. Network survivability against region failure. in Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference on. 2011. IEEE.
-
59. Cowie, J., et al., Impact of the 2003 blackouts on Internet communications. Preliminary Report, Renesys Corporation (updated March 1, 2004), 2003.
-
67. Molisz, W. and J. Rak, End-to-end service survivability under attacks on networks. Journal of Telecommunications and Information Technology, 2006. 3: p. 19-26.
-
68. Nagaraja, K., et al. Understanding and dealing with operator mistakes in internet services. in Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation. 2004.
-
71. Oppenheimer, D., A. Ganapathi, and D.A. Patterson, Why do internet services fail and what can be done about it? 2002: Computer Science Division, University of California.
-
75. Magoni, D., Tearing down the Internet. Selected Areas in Communications, IEEE Journal on, 2003. 21(6): p. 949-960.
-
77. Rohrer, J.P., A. Jabbar, and J.P.G. Sterbenz. Path diversification: A multipath resilience mechanism. in Design of Reliable Communication Networks, 2009. DRCN 2009. 7th International Workshop on. 2009. IEEE.
-
81. Wu, J., et al. Internet routing resilience to failures: analysis and implications. in Proceedings of the 2007 ACM CoNEXT conference. 2007. ACM.
-
93. Wang, P., et al. Threat risk analysis for cloud security based on Attack-Defense Trees. in Computing Technology and Information Management (ICCM), 2012 8th International Conference on. 2012. IEEE.
-
94. Letchford, J. and Y. Vorobeychik. Computing randomized security strategies in networked domains. in Proceedings of the Workshop on Applied Adversarial Reasoning and Risk Modeling (AARM) at AAAI. 2011.
-
99. Xie, L., P.E. Heegaard, and Y. Jiang. Network survivability under disaster propagation: Modeling and analysis. in Wireless Communications and Networking Conference (WCNC), 2013 IEEE. 2013. IEEE.
-
100. Gisdakis, S. and P. Papadimitratos. On the optimal allocation of adversarial resources. in Proceedings of the first ACM international workshop on Mission-oriented wireless sensor networking. 2012. ACM.
-
101. Li, X., Y. Zhu, and B. Li. Optimal anti-jamming strategy in sensor networks. in Communications (ICC), 2012 IEEE International Conference on. 2012. IEEE.
-
103. Wang, L., et al. Optimal voting strategy against rational attackers. in Risk and Security of Internet and Systems (CRiSIS), 2011 6th International Conference on. 2011. IEEE.
|