Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines

JPG Sterbenz, D Hutchison, EK Çetinkaya, A Jabbar… - Computer …, 2010 - Elsevier
The Internet has become essential to all aspects of modern life, and thus the consequences
of network disruption have become increasingly severe. It is widely recognised that the …

Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation

JPG Sterbenz, EK Çetinkaya, MA Hameed… - Telecommunication …, 2013 - Springer
As the Internet becomes increasingly important to all aspects of society, the consequences
of disruption become increasingly severe. Thus it is critical to increase the resilience and …

[PDF][PDF] Cyber security challenges and vulnerability assessment in the construction industry

BRK Mantha, BG de Soto - Proceedings of the Creative …, 2019 - researchgate.net
The construction industry is making a shift towards digitization and automation (known as
Construction 4.0) due to the rapid growth of information and communication technologies as …

Vulnerability assessment methods–a review

HV Nath - Advances in Network Security and Applications: 4th …, 2011 - Springer
This paper reviews the major contributions in the field of Vulnerability Assessment from 1990
onwards. Even well administered networks are vulnerable to attack. Vulnerabilities are …

[HTML][HTML] Investigation of the cyber vulnerabilities of construction networks using an agent-based model

BRK Mantha, MS Sonkor, BG de Soto - Developments in the Built …, 2024 - Elsevier
Most studies either addressed the technical gaps or adopted technological strategies to
enable construction automation and digitalization. However, the cybersecurity implications …

Vulnerability in dynamically driven oscillatory networks and power grids

X Zhang, C Ma, M Timme - Chaos: An interdisciplinary journal of …, 2020 - pubs.aip.org
Vulnerability of networks has so far been quantified mainly for structural properties. In driven
systems, however, vulnerability intrinsically relies on the collective response dynamics. As …

Dynamically adaptive network firewalls and method, system and computer program product implementing same

P Turley, E White - US Patent 8,397,282, 2013 - Google Patents
US8397282B2 - Dynamically adaptive network firewalls and method, system and computer
program product implementing same - Google Patents US8397282B2 - Dynamically adaptive …

Quantifying economic vulnerabilities induced by interdependent networks

S Pourshahabi, ST Shutters, R Muneepeerakul - PloS one, 2024 - journals.plos.org
Under economic globalization, countries are linked through trade and investments. This
economic interdependence creates vulnerabilities. The indirect vulnerability induced by …

An adaptive security model for mobile agents in wireless networks

SP Alampalayam, A Kumar - GLOBECOM'03. IEEE Global …, 2003 - ieeexplore.ieee.org
In this paper, we have proposed an adaptive security scheme for denial of service security
threats in mobile agent system based on wireless ad hoc network environment. This model …

An approach to quantifying resilience in mobile ad hoc networks

A Jabbar, H Narra, JPG Sterbenz - 2011 8th International …, 2011 - ieeexplore.ieee.org
Resilience is the ability of a network to provide acceptable service in the presence of
challenges to normal operations. With increasing significance of resilience in modern …