{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,4]],"date-time":"2024-07-04T09:47:44Z","timestamp":1720086464556},"reference-count":49,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Reliability Engineering & System Safety"],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1016\/j.ress.2014.09.021","type":"journal-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T13:39:26Z","timestamp":1412084366000},"page":"275-299","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":10,"special_numbering":"C","title":["Analysis of information security reliability: A tutorial"],"prefix":"10.1016","volume":"133","author":[{"given":"Suleyman","family":"Kondakci","sequence":"first","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.ress.2014.09.021_bib1","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1109\/TR.1979.5220566","article-title":"Time-dependent error-detection rate model for software reliability and other performance measures","volume":"R-28","author":"Goel","year":"1979","journal-title":"IEEE Trans Reliab"},{"issue":"1","key":"10.1016\/j.ress.2014.09.021_bib2","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/S0951-8320(02)00200-4","article-title":"A study of service reliability and availability for distributed systems","volume":"79","author":"Dai","year":"2003","journal-title":"Reliab Eng Syst Saf"},{"issue":"5","key":"10.1016\/j.ress.2014.09.021_bib3","doi-asserted-by":"crossref","first-page":"1216","DOI":"10.1109\/25.950322","article-title":"Composite performance and availability analysis of wireless communication networks","volume":"50","author":"Ma","year":"2001","journal-title":"IEEE Trans Veh Technol"},{"issue":"1","key":"10.1016\/j.ress.2014.09.021_bib4","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.ress.2005.11.005","article-title":"Service reliability and performance in grid system with star topology","volume":"92","author":"Levitin","year":"2007","journal-title":"Reliab Eng Syst Saf"},{"issue":"12","key":"10.1016\/j.ress.2014.09.021_bib5","doi-asserted-by":"crossref","first-page":"2140","DOI":"10.1016\/j.comnet.2009.03.012","article-title":"On the reliability of large-scale distributed systems\u2014a topological view","volume":"53","author":"He","year":"2009","journal-title":"Comput Netw"},{"issue":"11\u201313","key":"10.1016\/j.ress.2014.09.021_bib6","doi-asserted-by":"crossref","first-page":"1365","DOI":"10.1016\/S0895-7177(03)90139-7","article-title":"Note on reliability of a system complexity","volume":"38","author":"Nakagawa","year":"2003","journal-title":"Math Comput Model"},{"issue":"12","key":"10.1016\/j.ress.2014.09.021_bib7","doi-asserted-by":"crossref","first-page":"1471","DOI":"10.1002\/sec.591","article-title":"Intelligent network security assessment with modeling and analysis of attack patterns","volume":"5","author":"Kondakci","year":"2012","journal-title":"Secur Commun Netw"},{"issue":"6","key":"10.1016\/j.ress.2014.09.021_bib8","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1016\/S0370-1573(01)00025-4","article-title":"Predictability: a way to characterize complexity","volume":"356","author":"Boffetta","year":"2002","journal-title":"Phys Rep"},{"issue":"8","key":"10.1016\/j.ress.2014.09.021_bib9","doi-asserted-by":"crossref","first-page":"1243","DOI":"10.1016\/j.jcss.2013.02.006","article-title":"A survey on reliability in distributed systems","volume":"79","author":"Ahmed","year":"2013","journal-title":"J Comput Syst Sci"},{"issue":"3","key":"10.1016\/j.ress.2014.09.021_bib10","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1016\/j.ress.2006.04.012","article-title":"Integrated availability model based on performance of computer networks","volume":"92","author":"Jian","year":"2007","journal-title":"Reliab Eng Syst Saf"},{"issue":"12","key":"10.1016\/j.ress.2014.09.021_bib11","doi-asserted-by":"crossref","first-page":"1627","DOI":"10.1016\/j.ress.2011.08.003","article-title":"Semi-Markov modeling of dependability of VOIP network in the presence of resource degradation and security attacks","volume":"96","author":"Gupta","year":"2011","journal-title":"Reliab Eng Syst Saf"},{"issue":"0","key":"10.1016\/j.ress.2014.09.021_bib12","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1016\/j.ress.2012.11.001","article-title":"Probabilistic sensitivity analysis of system availability using Gaussian processes","volume":"112","author":"Daneshkhah","year":"2013","journal-title":"Reliab Eng Syst Saf"},{"issue":"9","key":"10.1016\/j.ress.2014.09.021_bib13","doi-asserted-by":"crossref","first-page":"1307","DOI":"10.1109\/TPDS.2007.1071","article-title":"Analysis and optimization of service availability in a HA cluster with load-dependent machine availability","volume":"18","author":"Ang","year":"2007","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"10.1016\/j.ress.2014.09.021_bib14","series-title":"Stochastic models of manufacturing systems","author":"Buzacott","year":"1993"},{"issue":"October (4)","key":"10.1016\/j.ress.2014.09.021_bib15","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1080\/15326340701645983","article-title":"Markov repairable systems with history-dependent up and down states","volume":"23","author":"Cui","year":"2007","journal-title":"Stoch Models"},{"issue":"2","key":"10.1016\/j.ress.2014.09.021_bib16","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1002\/sec.287","article-title":"Internet epidemiology","volume":"4","author":"Kondakci","year":"2011","journal-title":"Secur Commun Netw"},{"issue":"7","key":"10.1016\/j.ress.2014.09.021_bib17","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1016\/j.cose.2009.03.007","article-title":"A concise cost analysis of Internet malware","volume":"28","author":"Kondakci","year":"2009","journal-title":"Comput Secur"},{"issue":"9","key":"10.1016\/j.ress.2014.09.021_bib18","doi-asserted-by":"crossref","first-page":"992","DOI":"10.1016\/j.ress.2005.11.018","article-title":"Multi-objective optimization using genetic algorithms","volume":"91","author":"Konak","year":"2006","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2014.09.021_bib19","series-title":"The universal generating function in reliability analysis and optimization (Springer series in reliability engineering)","author":"Levitin","year":"2005"},{"issue":"0","key":"10.1016\/j.ress.2014.09.021_bib20","first-page":"1","article-title":"A new perspective on how to understand, assess and manage risk and the unforeseen","volume":"121","author":"Aven","year":"2014","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2014.09.021_bib21","series-title":"Probability & statistics with reliability queuing and computer science applications","author":"Trivedi","year":"2001"},{"issue":"8","key":"10.1016\/j.ress.2014.09.021_bib22","doi-asserted-by":"crossref","first-page":"2920","DOI":"10.1016\/j.jspi.2011.03.014","article-title":"Reliability analysis of consecutive k-out-of-n systems with non-identical components lifetimes","volume":"141","author":"Salehi","year":"2011","journal-title":"J Stat Plan Inference"},{"issue":"2","key":"10.1016\/j.ress.2014.09.021_bib23","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1016\/j.ress.2008.03.027","article-title":"Reliability properties of consecutive k-out-of-n systems of arbitrarily dependent components","volume":"94","author":"Eryilmaz","year":"2009","journal-title":"Reliab Eng Syst Saf"},{"issue":"1","key":"10.1016\/j.ress.2014.09.021_bib24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jkss.2011.05.003","article-title":"Failure rates of consecutive k-out-of-n systems","volume":"41","author":"Eryilmaz","year":"2012","journal-title":"J Korean Stat Soc"},{"issue":"10","key":"10.1016\/j.ress.2014.09.021_bib25","doi-asserted-by":"crossref","first-page":"1413","DOI":"10.1016\/j.ress.2006.09.003","article-title":"Bayesian networks for multilevel system reliability","volume":"92","author":"Wilson","year":"2007","journal-title":"Reliab Eng Syst Saf"},{"issue":"6","key":"10.1016\/j.ress.2014.09.021_bib26","doi-asserted-by":"crossref","first-page":"1461","DOI":"10.1287\/opre.1110.0973","article-title":"A study of interactions in the risk assessment of complex engineering systems","volume":"59","author":"Borgonovo","year":"2011","journal-title":"Oper Res"},{"key":"10.1016\/j.ress.2014.09.021_bib27","unstructured":"A.B. Notel, S.M. Sparta, Y. Yang, Generic threats to routing protocols, 2006. url: \u3008http:\/\/www.rfc-base.org\/txt\/rfc-4593.txt\u3009."},{"issue":"5","key":"10.1016\/j.ress.2014.09.021_bib28","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/MSP.2006.135","article-title":"Toward secure routing infrastructures","volume":"4","author":"Montgomery","year":"2006","journal-title":"Secur Priv IEEE"},{"issue":"0","key":"10.1016\/j.ress.2014.09.021_bib29","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ress.2012.09.012","article-title":"Network reliability analysis of complex systems using a non-simulation-based method","volume":"110","author":"Kim","year":"2013","journal-title":"Reliab Eng Syst Saf"},{"issue":"5","key":"10.1016\/j.ress.2014.09.021_bib30","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1016\/j.simpat.2008.02.011","article-title":"Epidemic state analysis of computers under malware attacks","volume":"16","author":"Kondakci","year":"2008","journal-title":"Simul Model Pract Theory"},{"issue":"2","key":"10.1016\/j.ress.2014.09.021_bib31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1346325.1346329","article-title":"Deterministic and stochastic models for the detection of random constant scanning worms","volume":"18","author":"Rohloff","year":"2008","journal-title":"ACM Trans Model Comput Simul"},{"issue":"5","key":"10.1016\/j.ress.2014.09.021_bib32","doi-asserted-by":"crossref","first-page":"1112","DOI":"10.1016\/j.jfranklin.2013.02.008","article-title":"Stochastic modeling of computer virus spreading with warning signals","volume":"350","author":"Amador","year":"2013","journal-title":"J Frankl Inst"},{"issue":"2","key":"10.1016\/j.ress.2014.09.021_bib33","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1016\/j.jtbi.2005.01.011","article-title":"Dynamical patterns of epidemic outbreaks in complex heterogeneous networks","volume":"235","author":"Barth\u00e8lemy","year":"2005","journal-title":"J Theor Biol"},{"issue":"1","key":"10.1016\/j.ress.2014.09.021_bib34","first-page":"11","article-title":"Dependency analysis of risks in information security","volume":"3","author":"Kondakci","year":"2008","journal-title":"Int Rev Comput Softw"},{"issue":"3","key":"10.1016\/j.ress.2014.09.021_bib35","first-page":"341","article-title":"A new assessment and improvement model of risk propagation in information security","volume":"1","author":"Kondakci","year":"2007","journal-title":"Int J Inf Comput Secur"},{"key":"10.1016\/j.ress.2014.09.021_bib36","doi-asserted-by":"crossref","unstructured":"Kondakci S. A causal model for information security risk assessment. In: 2010 Sixth International Conference on Information Assurance and Security (IAS); 2010, pp. 143\u2013148.","DOI":"10.1109\/ISIAS.2010.5604039"},{"issue":"2","key":"10.1016\/j.ress.2014.09.021_bib37","doi-asserted-by":"crossref","first-page":"542","DOI":"10.1016\/j.ress.2008.06.009","article-title":"A generic method for estimating system reliability using Bayesian networks","volume":"94","author":"Doguc","year":"2009","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2014.09.021_bib38","doi-asserted-by":"crossref","unstructured":"S. Kondakci, Network security risk assessment using bayesian belief networks, in: 2010 IEEE second international conference on social computing (socialcom), 2010, pp. 952\u2013960.","DOI":"10.1109\/SocialCom.2010.141"},{"issue":"2","key":"10.1016\/j.ress.2014.09.021_bib39","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/TDSC.2007.70230","article-title":"Modeling and automated containment of worms","volume":"5","author":"Sellke","year":"2008","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"10.1016\/j.ress.2014.09.021_bib40","unstructured":"Walpole RE, Myers RH, Myers SL, Ye K., Probability & statistics for engineers and scientists, Prentice\u2013Hall, Inc., USD, NJ, USA, 2002."},{"issue":"0","key":"10.1016\/j.ress.2014.09.021_bib41","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/j.ress.2012.11.006","article-title":"Bayesian inference method for stochastic damage accumulation modeling","volume":"111","author":"Jiang","year":"2013","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2014.09.021_bib42","unstructured":"W. Gragido, Lions at the watering hole\u2014the \u201cVOHO\u201d affair (July 2012). url: \u3008https:\/\/blogs.rsa.com\/lions-at-the-watering-hole-the-voho-affair\/\u3009."},{"key":"10.1016\/j.ress.2014.09.021_bib43","first-page":"271","article-title":"Efficient generation of PH-distributed random variates","volume":"vol. 7314","author":"Horv\u00e1th","year":"2012"},{"issue":"3","key":"10.1016\/j.ress.2014.09.021_bib44","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1023\/A:1016617904269","article-title":"Hyper-erlang distribution model and its application in wireless mobile networks","volume":"7","author":"Fang","year":"2001","journal-title":"Wirel. Netw"},{"issue":"3\u20134","key":"10.1016\/j.ress.2014.09.021_bib45","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/S0166-5316(97)00003-5","article-title":"Fitting mixtures of exponentials to long-tail distributions to analyze network performance models","volume":"31","author":"Feldmann","year":"1998","journal-title":"Perform Eval"},{"key":"10.1016\/j.ress.2014.09.021_bib46","unstructured":"S. Corporation, Internet security threat report 2014 (April 2014). url: \u3008http:\/\/www.symantec.com\/security_response\/publications\/\u3009."},{"issue":"3","key":"10.1016\/j.ress.2014.09.021_bib47","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1016\/j.ress.2004.06.004","article-title":"A discrete-time bayesian network reliability modeling and analysis framework","volume":"87","author":"Boudali","year":"2005","journal-title":"Reliab Eng Syst Saf"},{"issue":"1","key":"10.1016\/j.ress.2014.09.021_bib48","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1016\/j.ress.2005.11.037","article-title":"Bayesian networks in reliability","volume":"92","author":"Langseth","year":"2007","journal-title":"Reliab Eng & System Safety"},{"issue":"1","key":"10.1016\/j.ress.2014.09.021_bib49","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/TR.2006.890895","article-title":"A new stochastic model for systems under general repairs","volume":"56","author":"Guo","year":"2007","journal-title":"IEEE Trans Reliab"}],"container-title":["Reliability Engineering & System Safety"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0951832014002373?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0951832014002373?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T13:17:00Z","timestamp":1565875020000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0951832014002373"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":49,"alternative-id":["S0951832014002373"],"URL":"https:\/\/doi.org\/10.1016\/j.ress.2014.09.021","relation":{},"ISSN":["0951-8320"],"issn-type":[{"value":"0951-8320","type":"print"}],"subject":[],"published":{"date-parts":[[2015,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Analysis of information security reliability: A tutorial","name":"articletitle","label":"Article Title"},{"value":"Reliability Engineering & System Safety","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ress.2014.09.021","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2014 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}