Feynman Lectures on Computation
Feynman Lectures on Computation
Risk Modeling, Assessment, and Management
Risk Modeling, Assessment, and Management
Systems integration via software risk management
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Network Security Modeling and Cyber Attack Simulation Methodology
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
SECUSIM: A Tool for the Cyber-Attack Simulation
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Risk Reduction in COTS Software Selection with BASIS
ICCBSS '02 Proceedings of the First International Conference on COTS-Based Software Systems
The implications of E-commerce for software project risk: a preliminary investigation
Seeking sucess in E-business
Intrusion Tolerance in Distributed Middleware
Information Systems Frontiers
Software project risks and their effect on outcomes
Communications of the ACM - Human-computer etiquette
A model for evaluating IT security investments
Communications of the ACM - Has the Internet become indispensable?
Estimating Potential IT Security Losses: An Alternative Quantitative Approach
IEEE Security and Privacy
An empirical analysis of risk components and performance on software projects
Journal of Systems and Software
The importance of information security spending: an economic approach
Proceedings of the 2008 Spring simulation multiconference
Decision-Theoretic and Game-Theoretic Approaches to IT Security Investment
Journal of Management Information Systems
International Journal of Business Information Systems
Investments in Information Security: A Real Options Perspective with Bayesian Postaudit
Journal of Management Information Systems
SIMVA: simulation-based network vulnerability analysis system
SpringSim '09 Proceedings of the 2009 Spring Simulation Multiconference
IT and infrastructure's lost dependability
SE '08 Proceedings of the IASTED International Conference on Software Engineering
Design of intelligent security management system using simulation-based analysis
AI'05 Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence
Automated cyber-attack scenario generation using the symbolic simulation
AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
Linux-Based system modelling for cyber-attack simulation
AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
ICCBSS'05 Proceedings of the 4th international conference on COTS-Based Software Systems
International Journal of Information Management: The Journal for Information Professionals
Hi-index | 4.10 |
The emerging dominance of software in the lifecycle of our information systems, coupled with the risk and uncertainty associated with its development and maintenance, are increasing information systems vulnerability. Global interconnected-ness through the Internet and the increasing use of supervisory control and data acquisition systems to remotely operate the critical infrastructure through the telecommunications network have rendered our information systems more vulnerable to intrusion and the transmission of malicious misinformation and signals.For all practical purposes, international boundaries have been eliminated in cyber-space. The growth of information technology and almost universal access to computers have enabled hackers and would-be terrorists to attack information systems and critical infrastructures worldwide.The authors describe the hierarchical holographic modeling framework, which promotes a systemic process for assessing risk to critical infrastructures.