{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:56:02Z","timestamp":1730224562472,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/hase.2004.1281767","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T10:19:45Z","timestamp":1086862785000},"page":"293-296","source":"Crossref","is-referenced-by-count":3,"title":["Managing secure survivable critical infrastructures to avoid vulnerabilities"],"prefix":"10.1109","author":[{"given":"F.","family":"Sheldon","sequence":"first","affiliation":[]},{"given":"T.","family":"Potok","sequence":"additional","affiliation":[]},{"given":"A.","family":"Loebl","sequence":"additional","affiliation":[]},{"given":"A.","family":"Krings","sequence":"additional","affiliation":[]},{"given":"P.","family":"Oman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Assessing Power Substation Network Security and Survivability Progress Rpt Proc Int'l Conf on Security and Management","year":"2003","author":"taylor","key":"19"},{"key":"17","first-page":"25","article-title":"Protecting the Grid from cyber attack, part II: Safeguarding IEDS","volume":"7","author":"oman","year":"2002","journal-title":"Substations and SCADA Systems Utility Automation"},{"key":"18","article-title":"Attack and defend tools for remotely accessible control and protection equipment in electronic power systems","author":"oman","year":"2002","journal-title":"TAM Conf for PRE"},{"key":"15","article-title":"Risk analysis & probabilistic survivability assessment (RAPSA): An assessment approach for power substation hardening","author":"taylor","year":"2002","journal-title":"ACM SACT"},{"key":"16","article-title":"Considering attack complexity: Layered intrusion tolerance","author":"taylor","year":"2002","journal-title":"Proc IEEE DSN"},{"key":"13","first-page":"147","volume":"14","author":"sheldon","year":"2002","journal-title":"Metrics for Maintainability of Class Inheritance Hierarchies"},{"key":"14","article-title":"Modeling complex control systems to identify remotely accessible devices vulnerable to cyber attack","author":"conte de leon","year":"2002","journal-title":"ACM SACT"},{"key":"11","article-title":"Suitability of agent-based systems for command and control in fault-tolerant, safety-critical responsive decision networks","author":"potok","year":"2003","journal-title":"ISCA PDCS"},{"journal-title":"Multi-agent Systems for Knowledge Management and Decision Networks","year":"2004","author":"sheldon","key":"12"},{"key":"21","first-page":"259","article-title":"Assessment of high integrity component; for completeness, consistency, fault-tolerance and reliability","volume":"2693","author":"kim","year":"2003","journal-title":"LNCS"},{"journal-title":"Vulnerability Assessment and Survey Program Lessons Learned and Best Practices","year":"2001","key":"20"},{"key":"22","article-title":"The impact of hybrid fault models on scheduling for survivability","author":"krings","year":"2002","journal-title":"Wkshp on Scheduling in Computer-and Manufacturing Systems"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2003.1174907"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2002.994194"},{"key":"25","article-title":"Merging survivability system analysis and probability risk assessment for survivability analysis","author":"taylor","year":"2002","journal-title":"IEEE DSN 2002"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/52.143095"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/RAMS.2002.981660"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/IWSSD.2000.891133"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2003.1197580"},{"key":"1","first-page":"558","article-title":"Examining coincident failures and usage-profiles in reliability analysis of an embedded vehicle sub-system","author":"sheldon","year":"0","journal-title":"ASMT02"},{"journal-title":"NERC An Approach to Action for the Electricity Sector Ver 1","year":"2001","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2003.1174908"},{"key":"5","article-title":"Energy infrastructure survivability, inherent limitations, obstacles and mitigation strategies","author":"sheldon","year":"2003","journal-title":"IASTED International Conference PowerCon"},{"journal-title":"The Way of Z Practical Programming with Formal Methods","year":"1997","author":"jacky","key":"4"},{"key":"9","article-title":"VIPAR: Advanced information agents discovering knowledge in an open and changing environment","author":"potok","year":"2003","journal-title":"Proc SCI"},{"key":"8","article-title":"Modeling with stochastic message sequence charts","author":"zhou","year":"2003","journal-title":"HIS Proc CCCT"}],"event":{"name":"Eighth IEEE International Symposium on High Assurance Systems Engineering, 2004.","location":"Tampa, FL, USA"},"container-title":["Eighth IEEE International Symposium on High Assurance Systems Engineering, 2004. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9019\/28627\/01281767.pdf?arnumber=1281767","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T21:20:24Z","timestamp":1489440024000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1281767\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/hase.2004.1281767","relation":{},"subject":[]}}