2018
DOI: 10.1007/978-3-030-05849-4_5
|View full text |Cite
|
Sign up to set email alerts
|

A Measure for Resilience of Critical Infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…To conclude, within the plethora of the "current" existing tools (e.g. those presented or reviewed in [25,[37][38][39][40][41][42] or [43]), that all can simulate different resilience aspects of large and complex systems and/or apply optimization techniques to improve it (e.g. by indicating the optimum path towards system recovery or improving preparedness to unknowns) the approach presented here proposes a pragmatic and flexible way to achieve improvement through applying resilience indicators.…”
Section: Discussionmentioning
confidence: 99%
“…To conclude, within the plethora of the "current" existing tools (e.g. those presented or reviewed in [25,[37][38][39][40][41][42] or [43]), that all can simulate different resilience aspects of large and complex systems and/or apply optimization techniques to improve it (e.g. by indicating the optimum path towards system recovery or improving preparedness to unknowns) the approach presented here proposes a pragmatic and flexible way to achieve improvement through applying resilience indicators.…”
Section: Discussionmentioning
confidence: 99%
“…[44], cyber and/or physical attacks [47]- [49], [51], [55], etc. Some research works concentrate on a type of asset whatever its granularity (healthcare [44], civil aviation [46], power systems [50], [51], [53], [56], port infrastructure [48], airport infrastructure [57], supply chain [56], ADS-B system [46], etc.). However, to our knowledge, no research work is dedicated to the definition of an approach for cyber or physical incident propagation in a healthcare infrastructure as a whole.…”
Section: B Incident Propagation Models and Approachesmentioning
confidence: 99%
“…Ref. [48] also chooses a dependency graph to represent interrelations between assets of the same critical infrastructure. To simulate the behavior of physical and cyber assets after an incident, it proposes to model assets (nodes of the graph) as a probabilistic automaton.…”
Section: B Incident Propagation Models and Approachesmentioning
confidence: 99%