Author:
Cam Hasan,Mouallem Pierre
Publisher
Springer Science and Business Media LLC
Subject
General Environmental Science
Reference22 articles.
1. Amico FAD, Buchanan L, Goodall J, Walczak P (2010) Mission impact of cyber events: scenarios and ontology to express the relationships between cyber assets, missions and users. In: Proceedings of the International Conference on Information Warfare and Security, Dayton, Ohio
2. Bryant RE (1986) Graph-based algorithms for boolean function manipulation. IEEE Trans Comput 100(8):677–691
3. Cam H (2012) PeerShield: determining control and resilience criticality of collaborative cyber assets in networks. In: Proceedings of Cyber sensing 2012, SPIE defense, security, and sensing, 23–27 April 2012, Baltimore, MD
4. Cam H, Mouallem P (2013) Mission-aware time-dependent cyber asset criticality and resilience. In: Proceedings of 8th CSIIRW, Cyber security and information intelligence research workshop, ACM, January 8–10, Oak Ridge National Lab, Oak Ridge, TN, USA
5. Chin S, Muccio S, Older S, Vestal T (2010). Policy-based design and verification for mission assurance. In: 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, St. Petersburg, Russia, September 8–10
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献