{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:38:25Z","timestamp":1742992705464,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":13,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461492771"},{"type":"electronic","value":"9781461492788"}],"license":[{"start":{"date-parts":[[2013,12,7]],"date-time":"2013-12-07T00:00:00Z","timestamp":1386374400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,12,7]],"date-time":"2013-12-07T00:00:00Z","timestamp":1386374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-9278-8_15","type":"book-chapter","created":{"date-parts":[[2014,1,23]],"date-time":"2014-01-23T08:28:40Z","timestamp":1390465720000},"page":"325-343","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Controllability and Observability of Risk and Resilience in Cyber-Physical Cloud Systems"],"prefix":"10.1007","author":[{"given":"Hasan","family":"Cam","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,7]]},"reference":[{"key":"15_CR1","unstructured":"D. Catteddu et al., \u201cSecurity and Resilience in Government Clouds,\u201d ENISA, http:\/\/www.enisa.europa.eu\/act\/rm\/files\/deliverables\/cloud-computing-risk-assessment, Jan. 2011"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"N. Poolsappasit, R. Dewri, and I. Ray, \u201cDynamic Security Risk Management Using Bayesian Attack Graphs,\u201d IEEE Trans. on Dependable and Secure Computing, vol. 9, no. 1, Jan.\/Feb. 2012.","DOI":"10.1109\/TDSC.2011.34"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"H. Cam, \u201cPeerShield: Determining Control and Resilience Criticality of Collaborative Cyber Assets in Networks,\u201d Cyber Sensing 2012, SPIE Defense, Security, and Sensing, 23\u201327 April 2012, Baltimore, MD, USA.","DOI":"10.1117\/12.919394"},{"key":"15_CR4","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1137\/0301010","volume":"1","author":"R.E. Kalman","year":"1963","unstructured":"R.E. Kalman, \u201cMathematical description of linear dynamical systems,\u201d. J. Soc. Indus. Appl. Math. Ser. A 1, 152\u2013192 (1963).","journal-title":"J. Soc. Indus. Appl. Math. Ser. A"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"D.G. Luenberger, Introduction to Dynamic Systems: Theory, Models, & Applications (Wiley, 1979).","DOI":"10.21236\/ADA080206"},{"key":"15_CR6","unstructured":"J.-J. Slotine and W. Li. Applied Nonlinear Control (Prentice-Hall, 1991)."},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Y-Y. Liu, J-J. Slotine, A-L. Barabasi, \u201cControllability of Complex Systems,\u201d Nature, vol. 473, 12 May 2011.","DOI":"10.1038\/nature10011"},{"key":"15_CR8","unstructured":"Y-Y. Liu, J-J. Slotine, A-L. Barabasi, \u201cObservability of Complex Systems,\u201d Proc. of the National Academy of Sciences of the USA, Feb 12, 2013."},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"L. Checiu, B. Solomon, D. Ionescu, M. Litoiu, G. Iszlai, \u201cObservability and controllability of autonomic computing systems for composed web services,\u201d Proc. of the 6th IEEE International Symposium on Applied Computational Intelligence and Informatics, pp. 269\u2013274, 2011.","DOI":"10.1109\/SACI.2011.5873012"},{"key":"15_CR10","first-page":"33","volume-title":"Self-Adaptive Systems, Lecture notes in computer science (LNCS)","author":"Y Brun","year":"2013","unstructured":"Y. Brun, R. Desmarais, K. Geihs, M. Litoiu, A. Lopes, M. Smit, \u201cA design space for self-adaptive systems,\u201d R. Lemos et al. (Eds.), Self-Adaptive Systems, Lecture notes in computer science (LNCS), Vol. 7475, Springer, Berlin Heidelberg (2013), pp. 33\u201350."},{"key":"15_CR11","unstructured":"H. Cam, \u201c Risk and Resilience Controllability-Observability in Cloud Computing Security\u201d, ARO (Army Research Office) Cloud Security Workshop, March 11\u201312, 2013, George Mason University."},{"key":"15_CR12","unstructured":"J. Gao, L.J. Guibas, N. Milosavljevic, and D. Zhou, \u201cDistributed Resource Management and Matching in Sensor Networks,\u201d Proc. of the 8th International Symposium on Information Processing in Sensor Networks (IPSN\u201909), 97\u2013108, April, 2009."},{"key":"15_CR13","unstructured":"Subrata Chakraborty and Chung-Hsing Yeh, \u201cA simulation based comparitive study of normalization procedures in multiattribute decision making,\u201d in 6th WSEAS Intl. Conference on Artificial Intelligence, Knowledge Engineering and Databases, Corfu Island, Greece, 2007."}],"container-title":["Secure Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-9278-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,9]],"date-time":"2023-02-09T22:34:29Z","timestamp":1675982069000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-9278-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,7]]},"ISBN":["9781461492771","9781461492788"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-9278-8_15","relation":{},"subject":[],"published":{"date-parts":[[2013,12,7]]},"assertion":[{"value":"7 December 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}