Author of the publication

Assessing Systemic Risk to Cloud-Computing Technology as Complex Interconnected Systems of Systems.

, , , , and . Systems Engineering, 18 (3): 284-299 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Via Related Disciplines., , and . CSER, volume 8 of Procedia Computer Science, page 338-344. Elsevier, (2012)System-Aware Cyber Security., and . ITNG, page 914-917. IEEE Computer Society, (2011)Defense science board recommendations: an examination of defense policy on the use of modeling and simulation.. Winter Simulation Conference, page 224-230. IEEE Computer Society, (1990)A System-Aware Cyber Security architecture., and . Systems Engineering, 15 (2): 225-240 (2012)Assessing Systemic Risk to Cloud-Computing Technology as Complex Interconnected Systems of Systems., , , , and . Systems Engineering, 18 (3): 284-299 (2015)Policy Issues Regarding Implementations of Cyber Attack Resilience Solutions for Cyber Physical Systems.. AAAI Spring Symposia, AAAI Press, (2018)An ontological metamodel for cyber-physical system safety, security, and resilience coengineering., , , , , and . Softw. Syst. Model., 21 (1): 113-137 (2022)An architectural systems engineering methodology for addressing cyber security., and . Systems Engineering, 14 (3): 294-304 (2011)A Preliminary Design-Phase Security Methodology for Cyber-Physical Systems., , , , , , and . Systems, 7 (2): 21 (2019)The Potential for Underinvestment in Internet Security: Implications for Regulatory Policy., and . WEIS, (2006)