2018
DOI: 10.1007/978-3-030-01689-0_8
|View full text |Cite
|
Sign up to set email alerts
|

Towards the Evaluation of End-to-End Resilience Through External Consistency

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
1
1

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…Clédel et al [51] provided a framework to compare the resilience potential of different systems or configurations of the same system. The described model and metric cannot be used to determine if a system is resilient to a specific threat but it is used to determine if a system has more resilience potential than another one.…”
Section: Fuzzy Modelsmentioning
confidence: 99%
See 3 more Smart Citations
“…Clédel et al [51] provided a framework to compare the resilience potential of different systems or configurations of the same system. The described model and metric cannot be used to determine if a system is resilient to a specific threat but it is used to determine if a system has more resilience potential than another one.…”
Section: Fuzzy Modelsmentioning
confidence: 99%
“…As a consequence, this concept of resilience implies the management of adversarial events. Other approaches (see, e.g., [42,48,49,51] ) do not represent events that could impact a system but focus on system' s capacities and potentials that are available to handle events. This way, the specific case of adversarial events can be considered without having to explicitly represent them.…”
Section: Adversarial Eventsmentioning
confidence: 99%
See 2 more Smart Citations
“…For example, network virtualization helps provide defense in depth, while sensor redundancy helps provide faulttolerance. We use [3] to model deployments of these mechanisms in order to determine, and compare, their collective effectiveness at providing resilience in the testbed. For example, the rescue station is configured with weak credentials that allow an attacker to make a dictionary attack.…”
Section: Research Challenges Supported By Testbedmentioning
confidence: 99%