331
Views
24
CrossRef citations to date
0
Altmetric
Original Articles

Defence and attack of complex interdependent systems

Pages 364-376 | Received 08 May 2017, Accepted 05 Feb 2018, Published online: 03 Mar 2018

References

  • Azaiez, M. N., & Bier, V. M. (1995). Perfect aggregation for a class of general reliability models with Bayesian updating. Applied Mathematics and Computation, 73(2–3), 281–302. doi:10.1016/0096-3003(95)00068-2
  • Azaiez, M. N., & Bier, V. M. (2007). Optimal resource allocation for security in reliability systems. European Journal of Operational Research, 181(2), 773–786. doi:10.1016/j.ejor.2006.03.057
  • Ben Yaghlane, A., & Azaiez, M. N. (2016). Systems under attack-survivability rather than reliability: Concept, results, and applications. European Journal of Operational Research, 258(3), 1156–1164. doi:10.1016/j.ejor.2016.09.041
  • Bennett, C. J. (2013). Estimating optimal decision rules in the presence of model parameter uncertainty. Journal of Financial Econometrics, 11(1), 47–75. doi:10.1093/jjfinec/nbs012
  • Bier, V. M., & Lin, S. W. (2013). On the treatment of uncertainty and variability in making decisions about risk. Risk Analysis, 33(10), 1899–1907. doi:10.1111/risa.12071
  • Bier, V. M., Nagaraj, A., & Abhichandani, V. (2005). Protection of simple series and parallel systems with components of different values. Reliability Engineering & System Safety, 87(3), 315–323. doi:10.1016/j.ress.2004.06.003
  • Bier, V. M., Oliveros, S., & Samuelson, L. (2007). Choosing what to protect: Strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory, 9(4), 563–587. doi:10.1111/j.1467-9779.2007.00320.x
  • Cano, J., Rios Insua, D., Tedeschi, A., & Turhan, U.u. (2016). Security economics: An adversarial risk analysis approach to airport protection. Annals of Operations Research, 245(1), 359–378. doi:10.1007/s10479-014-1690-7
  • Chen, Z., Du, W.-B., Cao, X.-B., & Zhou, X.-L. (2015). Cascading failure of interdependent networks with different coupling preference under targeted attack. Chaos Solitons & Fractals, 80, 7–12. doi:10.1016/j.chaos.2015.03.005
  • Chopra, S. S., & Khanna, V. (2015). Interconnectedness and interdependencies of critical infrastructures in the US economy: Implications for resilience. Physica A: Statistical Mechanics and its Applications, 436, 865–877. doi:10.1016/j.physa.2015.05.091
  • Dyer, J. S., & Sarin, R. K. (1979). Measurable multiattribute value functions. Operations Research, 27(4), 810–822.10.1287/opre.27.4.810
  • Ebeling, C. (1997). An introduction to reliability and maintainability engineering. New York, NY: McGraw-Hill.
  • Enders, W., & Sandler, T. (2003). What do we know about the substitution effect in transnational terrorism? In A. Silke & G. Ilardi (Eds.), Researching terrorism: Trends, achievements, failures (pp. 119–137). Ilfords: Frank Cass.
  • Hadorn, D., Kvizhinadze, G., Collinson, L., & Blakely, T. (2014). Use of expert knowledge elicitation to estimate parameters in health economic decision models. International Journal of Technology Assessment in Health Care, 30(4), 461–468. doi:10.1017/s0266462314000427
  • Haimes, Y. Y., Horowitz, B. M., Lambert, J. H., Santos, J., Crowther, K., & Lian, C. Y. (2005). Inoperability input-output model for interdependent infrastructure sectors. II: Case studies. Journal of Infrastructure Systems, 11(2), 80–92. doi:10.1061/(asce)1076-0342(2005)11:2(80)
  • Haimes, Y. Y., Horowitz, B. M., Lambert, J. H., Santos, J. R., Lian, C. Y., & Crowther, K. G. (2005). Inoperability input-output model for interdependent infrastructure sectors. I: Theory and methodology. Journal of Infrastructure Systems, 11(2), 67–79. doi:10.1061/(asce)1076-0342(2005)11:2(67)
  • Harsanyi, J. C. (1967). Games with incomplete information played by “Bayesian” players, I-III. Part I. The basic model. Management Science, 14(3), 159–182. doi:10.1287/mnsc.14.3.159
  • Hausken, K. (2006). Income, interdependence, and substitution effects affecting incentives for security investment. Journal of Accounting and Public Policy, 25(6), 629–665. doi:10.1016/j.jaccpubpol.2006.09.001
  • Hausken, K. (2008). Strategic defense and attack for series and parallel reliability systems. European Journal of Operational Research, 186(2), 856–881. doi:10.1016/j.ejor.2007.02.013
  • Hausken, K. (2010). Defense and attack of complex and dependent systems. Reliability Engineering & System Safety, 95(1), 29–42. doi:10.1016/j.ress.2009.07.006
  • Hausken, K. (2011). Defense and attack of two-component multi-state systems. International Journal of Performability Engineering, 7(3), 205–216.
  • Hausken, K. (2014). Choosing what to protect when attacker resources and asset valuations are uncertain. Operations Research and Decisions, 24(3), 23–44.
  • Hausken, K. (2017). Defense and attack for interdependent systems. European Journal of Operational Research, 256(2), 582–591. doi:10.1016/j.ejor.2016.06.033
  • Hausken, K., & Levitin, G. (2009). Minmax defense strategy for complex multi-state systems. Reliability Engineering & System Safety, 94(2), 577–587. doi:10.1016/j.ress.2008.06.005
  • Hausken, K., & Levitin, G. (2012). Review of systems defense and attack models. International Journal of Performability Engineering, 8(4), 355–366.
  • Jaccard, M., & Dennis, M. (2006). Estimating home energy decision parameters for a hybrid energy-economy policy model. Environmental Modeling & Assessment, 11(2), 91–100. doi:10.1007/s10666-005-9036-0
  • Johansson, J., & Hassel, H. (2010). An approach for modelling interdependent infrastructures in the context of vulnerability analysis. Reliability Engineering & System Safety, 95(12), 1335–1344. doi:10.1016/j.ress.2010.06.010
  • Kasper, G. M. (1996). A theory of decision support system design for user calibration. Information Systems Research, 7(2), 215–232. doi:10.1287/isre.7.2.215
  • Kunreuther, H., & Heal, G. (2003). Interdependent security. Journal of Risk and Uncertainty, 26(2–3), 231–249. doi:10.1023/a:1024119208153
  • Lamrock, F., Cairns, K., Kee, F., Conrads-Frank, A., Schnell-Inderst, P., Salomaa, V., … Siebert, U. (2015). Improving parameter estimation for a decision-analytic markov model to evaluate the use of novel biomarker led strategies for prevention of cardiovascular disease. Value in Health, 18(3), A13–A13.10.1016/j.jval.2015.03.084
  • Leontief, W. W. (1966). Input-output economics. New York, NY: Oxford University Press.
  • Levitin, G. (2007). Optimal defense strategy against intentional attacks. IEEE Transactions on Reliability, 56(1), 148–157. doi:10.1109/tr.2006.884599
  • Li, R.-Q., Sun, S.-W., Ma, Y.-L., Wang, L., & Xia, C.-Y. (2015). Effect of clustering on attack vulnerability of interdependent scale-free networks. Chaos Solitons & Fractals, 80, 109–116. doi:10.1016/j.chaos.2015.06.022
  • Lian, C., Santos, J. R., & Haimes, Y. Y. (2007). Extreme risk analysis of interdependent economic and infrastructure sectors. Risk Analysis, 27(4), 1053–1064. doi:10.1111/j.1539-6924.2007.00943.x
  • Lisnianski, A., & Levitin, G. (2003). Multi-state system reliability: Assessment, optimization and applications (Vol. 6). River Edge, NJ: World Scientific.10.1142/SQRES
  • Nikoofal, M. E., & Zhuang, J. (2015). On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness. European Journal of Operational Research, 246(1), 320–330. doi:10.1016/j.ejor.2015.04.043
  • Ouyang, M. (2014). Review on modeling and simulation of interdependent critical infrastructure systems. Reliability Engineering & System Safety, 121, 43–60. doi:10.1016/j.ress.2013.06.040
  • Pakes, A., Ostrovsky, M., & Berry, S. (2007). Simple estimators for the parameters of discrete dynamic games (with entry/exit examples). Rand Journal of Economics, 38(2), 373–399. doi:10.1111/j.1756-2171.2007.tb00073.x
  • Parnell, G. S., Borio, L. L., Brown, G. G., Banks, D., & Wilson, A. G. (2008). Scientists urge DHS to improve bioterrorism risk assessment. Biosecurity and Bioterrorism-Biodefense Strategy Practice and Science, 6(4), 353–356. doi:10.1089/bsp.2008.0930
  • Parnell, G. S., Smith, C. M., & Moxley, F. I. (2010). Intelligent adversary risk analysis: A bioterrorism risk management model. Risk Analysis, 30(1), 32–48. doi:10.1111/j.1539-6924.2009.01319.x
  • Quijano, E. G., Rios Insua, D., & Cano, J. (2016). Critical networked infrastructure protection from adversaries. Reliability Engineering and System Safety. doi:10.1016/j.ress.2016.10.015. Retrieved from https://www.sciencedirect.com/science/article/pii/S0951832016307037
  • Raiffa, H., Richardson, J., & Metcalfe, D. (2002). Negotiation analysis : The science and art of collaborative decision making. Cambridge, MA: Belknap Press of Harvard University Press.
  • Ramirez-Marquez, J. E., & Coit, D. W. (2005). A Monte-Carlo simulation approach for approximating multi-state two-terminal reliability. Reliability Engineering & System Safety, 87(2), 253–264. doi:10.1016/j.ress.2004.05.002
  • Rios Insua, D., Cano, J., Pellot, M., & Ortega, R. (2016). Multithreat multisite protection: A security case study. European Journal of Operational Research, 252(3), 888–899. doi:10.1016/j.ejor.2016.01.041
  • Rios Insua, D., Rios, J., & Banks, D. (2009). Adversarial risk analysis. Journal of the American Statistical Association, 104(486), 841–854. doi:10.1198/jasa.2009.0155
  • Rios Insua, D., Rios, J., & Banks, D. (2016). Modeling opponents in adversarial risk analysis. Risk Analysis, 36(4), 742–755. doi:10.1111/risa.12439
  • Rothschild, C., McLay, L., & Guikema, S. (2012). Adversarial risk analysis with incomplete information: A level-k approach. Risk Analysis, 32(7), 1219–1231. doi:10.1111/j.1539-6924.2011.01701.x
  • Simon, H. (1969). The sciences of the artificial. Cambridge, MA: MIT Press.
  • Taylor, J. G. (1980a). Lanchester-type models of warfare (Vol. I). Monterey, CA: Naval Postgraduate School.
  • Taylor, J. G. (1980b). Lanchester-type models of warfare (Vol. II). Monterey, CA: Naval Postgraduate School.
  • Tullock, G. (1980). Efficient rent-seeking. In J. M. Buchanan, R. D. Tollison, & G. Tullock (Eds.), Toward a theory of the rent-seeking society (pp. 97–112). College Station, TX: Texas A. & M. University Press.
  • Wang, J., Wu, Y., & Li, Y. (2015). Attack robustness of cascading load model in interdependent networks. International Journal of Modern Physics C, 26(3), 1550030. doi:10.1142/s0129183115500308
  • Wang, S., Hong, L., & Chen, X. (2012). Vulnerability analysis of interdependent infrastructure systems: A methodological framework. Physica A: Statistical Mechanics and its Applications, 391(11), 3323–3335. doi:10.1016/j.physa.2011.12.043
  • Wang, S., Hong, L., Ouyang, M., Zhang, J., & Chen, X. (2013). Vulnerability analysis of interdependent infrastructure systems under edge attack strategies. Safety Science, 51(1), 328–337. doi:10.1016/j.ssci.2012.07.003
  • Wu, B., Tang, A., & Wu, J. (2016). Modeling cascading failures in interdependent infrastructures under terrorist attacks. Reliability Engineering & System Safety, 147, 1–8. doi:10.1016/j.ress.2015.10.019
  • Zhang, P., Cheng, B., Zhao, Z., Li, D., Lu, G., Wang, Y., & Xiao, J. (2013). The robustness of interdependent transportation networks under targeted attack. EPL, 103(6), 68005. doi:10.1209/0295-5075/103/68005
  • Zhuang, J., Dighe, N. S., & Bier, V. M. (2009). Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence. International Journal of Performability Engineering, 5(1), 31–43.
  • Zio, E., & Podofillini, L. (2003). Monte Carlo simulation analysis of the effects of different system performance levels on the importance of multi-state components. Reliability Engineering & System Safety, 82(1), 63–73. doi:10.1016/s0951-8320(03)00124-8

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.