1. Albanese, M., Jajodia, S., Jhawar, R., Piuri, V.: Reliable mission deployment in vulnerable distributed systems. In: 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), pp. 1–8. IEEE (2013)
2. Bahl, P., Barham, P., Black, R., Chandra, R., Goldszmidt, M., Isaacs, R., Kandula, S., Li, L., MacCormick, J., Maltz, D.A., et al.: Discovering dependencies for network management. In: ACM SIGCOMM 5th Workshop on Hot Topics in Networks (Hotnets-V), pp. 97–102. ACM (2006)
3. Bahl, P., Chandra, R., Greenberg, A., Kandula, S., Maltz, D.A., Zhang, M.: Towards highly reliable enterprise network services via inference of multi-level dependencies. ACM SIGCOMM Comput. Commun. Rev. 37, 13–24 (2007)
4. de Barros Barreto, A., Costa, P.C.G., Yano, E.T.: A semantic approach to evaluate the impact of cyber actions on the physical domain (2012)
5. Briechle, K., Hanebeck, U.D.: Template matching using fast normalized cross correlation. In: Aerospace/Defense Sensing, Simulation, and Controls, pp. 95–102. International Society for Optics and Photonics (2001)