메뉴 건너뛰기




Volumn 43, Issue 4, 2012, Pages 687-710

Quantifying Cyberinfrastructure Resilience against Multi-Event Attacks

Author keywords

and Network Security; Disaster Resilience; Information Infrastructure; Multi Event Resilience

Indexed keywords


EID: 84863544613     PISSN: 00117315     EISSN: 15405915     Source Type: Journal    
DOI: 10.1111/j.1540-5915.2012.00364.x     Document Type: Article
Times cited : (80)

References (37)
  • 1
    • 84863546074 scopus 로고    scopus 로고
    • Annual threat assessment of the intelligence community for the Senate Select Committee on Intelligence
    • Washington, DC
    • Blair, D. C. (2009). Annual threat assessment of the intelligence community for the Senate Select Committee on Intelligence. Office of the Director of National Intelligence, Washington, DC
    • (2009) Office of the Director of National Intelligence
    • Blair, D.C.1
  • 2
    • 0347567117 scopus 로고    scopus 로고
    • A framework to quantitatively assess and enhance the seismic resilience of communities
    • Bruneau, M., Chang, S. E., Eguchi, R. T., Lee, G. C., O'Rourke, T. D., Reinhorn, A. M., et al. (2003). A framework to quantitatively assess and enhance the seismic resilience of communities. Earthquake Spectra, 19(4), 733-752.
    • (2003) Earthquake Spectra , vol.19 , Issue.4 , pp. 733-752
    • Bruneau, M.1    Chang, S.E.2    Eguchi, R.T.3    Lee, G.C.4    O'Rourke, T.D.5    Reinhorn, A.M.6
  • 3
    • 7444242205 scopus 로고    scopus 로고
    • The effect of internet security breach announcements on market value of breached firms and internet security developers
    • Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004). The effect of internet security breach announcements on market value of breached firms and internet security developers. International Journal of Electronic Commerce, 9(1), 69-105.
    • (2004) International Journal of Electronic Commerce , vol.9 , Issue.1 , pp. 69-105
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 4
    • 18944385964 scopus 로고    scopus 로고
    • The value of intrusion detection systems in information technology security architecture
    • Cavusoglu, H., Mishra, B., & Raghunathan, S. (2005). The value of intrusion detection systems in information technology security architecture. Information Systems Research, 16(1), 28-46.
    • (2005) Information Systems Research , vol.16 , Issue.1 , pp. 28-46
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 5
    • 67649529385 scopus 로고    scopus 로고
    • Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems
    • Cavusoglu, H., & Raghunathan, S. (2009). Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems. Information Systems Research, 20(2), 198-217.
    • (2009) Information Systems Research , vol.20 , Issue.2 , pp. 198-217
    • Cavusoglu, H.1    Raghunathan, S.2
  • 6
    • 85045163517 scopus 로고    scopus 로고
    • The role of modeling in the resilience of cyberinfrastructure systems and preparedness for cyber intrusions
    • Chittister, C. G., & Haimes, Y. Y. (2011). The role of modeling in the resilience of cyberinfrastructure systems and preparedness for cyber intrusions. Journal of Homeland Security and Emergency Management, 8(1), 1547-1577.
    • (2011) Journal of Homeland Security and Emergency Management , vol.8 , Issue.1 , pp. 1547-1577
    • Chittister, C.G.1    Haimes, Y.Y.2
  • 8
    • 84863542333 scopus 로고    scopus 로고
    • Computer Security Institute. 2009 Computer Crime & Security Survey. Retrieved from
    • Computer Security Institute. (2009). 2009 Computer Crime & Security Survey. Retrieved from
    • (2009)
  • 9
    • 34047184222 scopus 로고    scopus 로고
    • The severity of supply chain disruptions: Design characteristics and mitigation capabilities
    • Craighead, C. W., Blackhurst, J., Rungtusanatham, M. J., & Handfield, R. B. (2007). The severity of supply chain disruptions: Design characteristics and mitigation capabilities. Decision Sciences, 38(1), 131-156.
    • (2007) Decision Sciences , vol.38 , Issue.1 , pp. 131-156
    • Craighead, C.W.1    Blackhurst, J.2    Rungtusanatham, M.J.3    Handfield, R.B.4
  • 10
    • 56949087304 scopus 로고    scopus 로고
    • A place-based model for understanding community resilience to natural disasters
    • Cutter, S., Barnes, L., Berry, M., Burton, C., Evans, E., Tate, E., et al. (2008). A place-based model for understanding community resilience to natural disasters. Global Environmental Change, 18(4), 598-606.
    • (2008) Global Environmental Change , vol.18 , Issue.4 , pp. 598-606
    • Cutter, S.1    Barnes, L.2    Berry, M.3    Burton, C.4    Evans, E.5    Tate, E.6
  • 11
    • 0002000920 scopus 로고    scopus 로고
    • Denial-of-service attacks rip the Internet
    • Garber, L. (2000). Denial-of-service attacks rip the Internet. IEEE Computer, 33(4), 12-17.
    • (2000) IEEE Computer , vol.33 , Issue.4 , pp. 12-17
    • Garber, L.1
  • 12
    • 62749127251 scopus 로고    scopus 로고
    • On the definition of resilience in systems
    • Haimes, Y. (2009). On the definition of resilience in systems. Risk Analysis: An International Journal, 29(4), 498-501.
    • (2009) Risk Analysis: An International Journal , vol.29 , Issue.4 , pp. 498-501
    • Haimes, Y.1
  • 13
    • 34547320186 scopus 로고    scopus 로고
    • A knowledge architecture for IT security
    • Kesh, S., & Ratnasingam, P. (2007). A knowledge architecture for IT security. Communications of the ACM, 50(7), 103-108.
    • (2007) Communications of the ACM , vol.50 , Issue.7 , pp. 103-108
    • Kesh, S.1    Ratnasingam, P.2
  • 14
    • 70350786960 scopus 로고    scopus 로고
    • Quantifying the benefits of investing in information security
    • Khansa, L., & Liginlal, D. (2009a). Quantifying the benefits of investing in information security. Communications of the ACM, 52(11), 113-117.
    • (2009) Communications of the ACM , vol.52 , Issue.11 , pp. 113-117
    • Khansa, L.1    Liginlal, D.2
  • 15
    • 50849136520 scopus 로고    scopus 로고
    • Valuing the flexibility of investing in security process innovations
    • Khansa, L., & Liginlal, D. (2009b). Valuing the flexibility of investing in security process innovations. European Journal of Operational Research, 192(1), 216-235.
    • (2009) European Journal of Operational Research , vol.192 , Issue.1 , pp. 216-235
    • Khansa, L.1    Liginlal, D.2
  • 16
    • 66549103101 scopus 로고    scopus 로고
    • Understanding the value of countermeasure portfolios in information systems security
    • Kumar, R. L., Park, S., & Subramaniam, C. (2008). Understanding the value of countermeasure portfolios in information systems security. Journal of Management Information Systems, 25(2), 241-280.
    • (2008) Journal of Management Information Systems , vol.25 , Issue.2 , pp. 241-280
    • Kumar, R.L.1    Park, S.2    Subramaniam, C.3
  • 17
    • 78049418283 scopus 로고    scopus 로고
    • Analysis of facility protection strategies against an uncertain number of attacks: The stochastic R-interdiction median problem with fortification
    • Liberatore, F., Scaparra, M. P., & Daskin, M. S. (2011). Analysis of facility protection strategies against an uncertain number of attacks: The stochastic R-interdiction median problem with fortification. Computers & Operations Research, 38(1), 357-366.
    • (2011) Computers & Operations Research , vol.38 , Issue.1 , pp. 357-366
    • Liberatore, F.1    Scaparra, M.P.2    Daskin, M.S.3
  • 18
    • 63049132678 scopus 로고    scopus 로고
    • How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management
    • Liginlal, D., Sim, I., & Khansa, L. (2009). How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management. Computers & Security, 28(3-4), 215-228.
    • (2009) Computers & Security , vol.28 , Issue.3-4 , pp. 215-228
    • Liginlal, D.1    Sim, I.2    Khansa, L.3
  • 20
    • 44149099991 scopus 로고    scopus 로고
    • Fostering resilience to extreme events within infrastructure systems: Characterizing decision contexts for mitigation and adaptation
    • McDaniels, T., Chang, S. E., Cole, D., Mikawoz, J., & Longstaff, H. (2008). Fostering resilience to extreme events within infrastructure systems: Characterizing decision contexts for mitigation and adaptation. Global Environmental Change, 18(2), 310-318.
    • (2008) Global Environmental Change , vol.18 , Issue.2 , pp. 310-318
    • McDaniels, T.1    Chang, S.E.2    Cole, D.3    Mikawoz, J.4    Longstaff, H.5
  • 21
    • 0035565671 scopus 로고    scopus 로고
    • An improved security requirement for data perturbation with implications for E-commerce
    • Muralidhar, K., Sarathy, R., & Parsa, R. (2001). An improved security requirement for data perturbation with implications for E-commerce. Decision Sciences, 32(4), 683-698.
    • (2001) Decision Sciences , vol.32 , Issue.4 , pp. 683-698
    • Muralidhar, K.1    Sarathy, R.2    Parsa, R.3
  • 22
    • 15744376024 scopus 로고    scopus 로고
    • Lessons learned from the World Trade Center disaster about critical utility systems
    • In. Boulder, CO: University of Colorado, Natural Hazards Research and Applications Information Center
    • O'Rourke, T. D., Lembo, A. J., & Nozick, L. K. (2003). Lessons learned from the World Trade Center disaster about critical utility systems. InBeyond September 11th: An Account of Post-Disaster Research. Boulder, CO: University of Colorado, Natural Hazards Research and Applications Information Center, 269-290.
    • (2003) Beyond September 11th: An Account of Post-Disaster Research , pp. 269-290
    • O'Rourke, T.D.1    Lembo, A.J.2    Nozick, L.K.3
  • 26
    • 33748594201 scopus 로고    scopus 로고
    • An information systems security risk assessment model under the Dempster-Shafer theory of belief functions
    • Sun, L., Srivastava, R. P., & Mock, T. J. (2006). An information systems security risk assessment model under the Dempster-Shafer theory of belief functions. Journal of Management Information Systems, 22(4), 109-142.
    • (2006) Journal of Management Information Systems , vol.22 , Issue.4 , pp. 109-142
    • Sun, L.1    Srivastava, R.P.2    Mock, T.J.3
  • 27
    • 34548298059 scopus 로고    scopus 로고
    • Conceptualizing and measuring resilience: A key to disaster loss reduction
    • Tierney, K., & Bruneau, M. (2007). Conceptualizing and measuring resilience: A key to disaster loss reduction. TR News, 250, 14-17.
    • (2007) TR News , vol.250 , pp. 14-17
    • Tierney, K.1    Bruneau, M.2
  • 29
    • 61349180141 scopus 로고    scopus 로고
    • A value-at-risk approach to information security investment
    • Wang, J., Chaudhury, A., & Rao, H. R. (2008). A value-at-risk approach to information security investment. Information Systems Research, 19(1), 106-120.
    • (2008) Information Systems Research , vol.19 , Issue.1 , pp. 106-120
    • Wang, J.1    Chaudhury, A.2    Rao, H.R.3
  • 31
    • 84863539258 scopus 로고    scopus 로고
    • Statement of Amit Yoran, Director, National Cyber Security Division, Department of Homeland Security. In US Senate Committee on the Judiciary. Virtual threat, real terror: Cyberterrorism in the 21st century
    • Retrieved from
    • Yoran, A. (2004). Statement of Amit Yoran, Director, National Cyber Security Division, Department of Homeland Security. In US Senate Committee on the Judiciary. Virtual threat, real terror: Cyberterrorism in the 21st century. Hearing before the Subcommittee on Terrorism, Technology and Homeland Security, 108th Congress, 2nd session, 8-18. Retrieved from
    • (2004) Hearing before the Subcommittee on Terrorism, Technology and Homeland Security, 108th Congress, 2nd session , pp. 8-18
    • Yoran, A.1
  • 32
    • 38349147070 scopus 로고    scopus 로고
    • Intrusion prevention in information systems: Reactive and proactive responses
    • Yue, W. T., & Çakanyildirim, M. (2007). Intrusion prevention in information systems: Reactive and proactive responses. Journal of Management Information Systems, 24(1), 329-353.
    • (2007) Journal of Management Information Systems , vol.24 , Issue.1 , pp. 329-353
    • Yue, W.T.1    Çakanyildirim, M.2
  • 33
    • 34548477450 scopus 로고    scopus 로고
    • Network externalities, layered protection and IT security risk management
    • Yue, W. T., Çakanyildirim, M., Ryu, Y. U., & Liu, D. (2007). Network externalities, layered protection and IT security risk management. Decision Support Systems, 44(1), 1-16.
    • (2007) Decision Support Systems , vol.44 , Issue.1 , pp. 1-16
    • Yue, W.T.1    Çakanyildirim, M.2    Ryu, Y.U.3    Liu, D.4
  • 34
    • 71749107086 scopus 로고    scopus 로고
    • A survey of coordinated attacks and collaborative intrusion detection
    • Zhou, C. V., Leckie, C., & Karunasekera, S. (2010). A survey of coordinated attacks and collaborative intrusion detection. Computers & Security, 29(1), 124-140.
    • (2010) Computers & Security , vol.29 , Issue.1 , pp. 124-140
    • Zhou, C.V.1    Leckie, C.2    Karunasekera, S.3
  • 35
    • 38549098290 scopus 로고    scopus 로고
    • Balancing terrorism and natural disasters defensive strategy with endogenous attacker effort
    • Zhuang, J., & Bier, V. M. (2007). Balancing terrorism and natural disasters defensive strategy with endogenous attacker effort. Operations Research, 55(5), 976-991.
    • (2007) Operations Research , vol.55 , Issue.5 , pp. 976-991
    • Zhuang, J.1    Bier, V.M.2
  • 36
    • 84905668734 scopus 로고    scopus 로고
    • Comparative visualization of predicted disaster resilience
    • Seattle, WA: ISCRAM
    • Zobel, C. W. (2010). Comparative visualization of predicted disaster resilience. Proceedings of the 7th International ISCRAM Conference. Seattle, WA: ISCRAM, 1-5.
    • (2010) Proceedings of the 7th International ISCRAM Conference , pp. 1-5
    • Zobel, C.W.1
  • 37
    • 78650171177 scopus 로고    scopus 로고
    • Representing perceived tradeoffs in defining disaster resilience
    • Zobel, C. W. (2011). Representing perceived tradeoffs in defining disaster resilience. Decision Support Systems, 50(2), 394-403.
    • (2011) Decision Support Systems , vol.50 , Issue.2 , pp. 394-403
    • Zobel, C.W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.