{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:01:01Z","timestamp":1730293261627,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/rndm.2018.8489830","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T03:39:21Z","timestamp":1539661161000},"page":"1-8","source":"Crossref","is-referenced-by-count":12,"title":["Analytical modeling and assessment of cyber resilience on the base of stochastic networks conversion"],"prefix":"10.1109","author":[{"given":"Igor","family":"Kotenko","sequence":"first","affiliation":[]},{"given":"Igor","family":"Saenko","sequence":"additional","affiliation":[]},{"given":"Oleg","family":"Lauta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2012.01885.x"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.7564"},{"journal-title":"Measuring Cyber Security and Information Assurance Information Assurance Technology Analysis Center","year":"2009","author":"bartol","key":"ref12"},{"key":"ref13","article-title":"Resilience and sustainability of civil infrastructure: toward a unified approach","volume":"20","author":"frangopol","year":"2014","journal-title":"J Infrastruct Syst"},{"journal-title":"From Algorithms to Z-Scores Probabilistic and Statistical Modeling in Computer Science","year":"0","author":"matlof","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2013.13"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.5121\/ijcnc.2015.7101"},{"key":"ref17","first-page":"2015","article-title":"General Stochastic Networks for Classification","volume":"27","author":"z\u00f6hrer","year":"2014","journal-title":"Advances in neural information processing systems"},{"journal-title":"Deep generative stochastic networks trainable by backprop","year":"2014","author":"bengio","key":"ref18"},{"year":"0","key":"ref19"},{"key":"ref4","article-title":"Operational resilience: Concepts, design and analysis","author":"ganin","year":"2015","journal-title":"Scientific Reports"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5936160"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/978-3-319-77492-3_7","article-title":"Modeling the Impact of Cyber Attacks","author":"kotenko","year":"2019","journal-title":"Cyber Resilience of Systems and Networks Risk Systems and Decisions Chapter7"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139565363"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69784-0_15"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/978-981-10-7850-7_10","article-title":"Assessment of computer network resilience under impact of cyber attacks on the basis of stochastic networks conversion","volume":"797","author":"kotenko","year":"2018","journal-title":"Communications in Computer and Information Science"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.03.005"},{"journal-title":"Disaster Resilience A National Imperatitve","year":"2012","key":"ref9"},{"key":"ref1","first-page":"1","article-title":"Modelling and Analysis of Network Resilience (invited paper)","author":"sterbenz","year":"2011","journal-title":"The Third IEEE International Conference on Communication Systems and Networks (COMSNETS)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.1998.738567"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36084-0_11"},{"key":"ref21","first-page":"1","article-title":"A Cyber Attack Modeling and Impact Assessment Framework","author":"kotenko","year":"2013","journal-title":"Proc of the 5th IEEE International Conference on Cyber Conflict (CyCon)"},{"journal-title":"Laplace Transforms Problem Solvers","year":"1973","author":"williams","key":"ref24"},{"key":"ref23","article-title":"Introduction to Stochastic Networks","volume":"44","author":"serfozo","year":"1999","journal-title":"Applications of Mathematics"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/BF00412328"},{"journal-title":"Fundamentals of Network Analysis","year":"1981","author":"phillips","key":"ref25"}],"event":{"name":"2018 10th International Workshop on Resilient Networks Design and Modeling (RNDM)","start":{"date-parts":[[2018,8,27]]},"location":"Longyearbyen","end":{"date-parts":[[2018,8,29]]}},"container-title":["2018 10th International Workshop on Resilient Networks Design and Modeling (RNDM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8476152\/8489783\/08489830.pdf?arnumber=8489830","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T19:44:59Z","timestamp":1643226299000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8489830\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/rndm.2018.8489830","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}