{"id":"https://openalex.org/W2136348742","doi":"https://doi.org/10.1109/discex.2003.1194967","title":"Predicting the impact of cyber-attacks on BMC/sup 3/ enterprises","display_name":"Predicting the impact of cyber-attacks on BMC/sup 3/ enterprises","publication_year":2004,"publication_date":"2004-03-22","ids":{"openalex":"https://openalex.org/W2136348742","doi":"https://doi.org/10.1109/discex.2003.1194967","mag":"2136348742"},"language":"en","primary_location":{"id":"doi:10.1109/discex.2003.1194967","is_oa":false,"landing_page_url":"https://doi.org/10.1109/discex.2003.1194967","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings DARPA Information Survivability Conference and Exposition","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018664721","display_name":"John J. Shaw","orcid":"https://orcid.org/0000-0002-5420-061X"},"institutions":[{"id":"https://openalex.org/I4210159818","display_name":"Alpha Environmental (United States)","ror":"https://ror.org/05j2afk93","country_code":"US","type":"company","lineage":["https://openalex.org/I4210159818"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"J.J. Shaw","raw_affiliation_strings":["Alpha Technologies, Inc., USA","[Alpha Technologies, Inc., USA]"],"affiliations":[{"raw_affiliation_string":"Alpha Technologies, Inc., USA","institution_ids":[]},{"raw_affiliation_string":"[Alpha Technologies, Inc., USA]","institution_ids":["https://openalex.org/I4210159818"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5018664721"],"corresponding_institution_ids":["https://openalex.org/I4210159818"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.23134265,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":null,"first_page":"208","last_page":"213"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11195","display_name":"Simulation Techniques and Applications","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.7028753161430359},{"id":"https://openalex.org/keywords/information-assurance","display_name":"Information assurance","score":0.6518365740776062},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6503410339355469},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.481395959854126},{"id":"https://openalex.org/keywords/safeguard","display_name":"Safeguard","score":0.4460316300392151},{"id":"https://openalex.org/keywords/fidelity","display_name":"Fidelity","score":0.4305209517478943},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.17438703775405884},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.1571139693260193},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.10261410474777222}],"concepts":[{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.7028753161430359},{"id":"https://openalex.org/C2780795517","wikidata":"https://www.wikidata.org/wiki/Q6030997","display_name":"Information assurance","level":3,"score":0.6518365740776062},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6503410339355469},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.481395959854126},{"id":"https://openalex.org/C2780771206","wikidata":"https://www.wikidata.org/wiki/Q3271761","display_name":"Safeguard","level":2,"score":0.4460316300392151},{"id":"https://openalex.org/C2776459999","wikidata":"https://www.wikidata.org/wiki/Q2119376","display_name":"Fidelity","level":2,"score":0.4305209517478943},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.17438703775405884},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.1571139693260193},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.10261410474777222},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C155202549","wikidata":"https://www.wikidata.org/wiki/Q178803","display_name":"International trade","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/discex.2003.1194967","is_oa":false,"landing_page_url":"https://doi.org/10.1109/discex.2003.1194967","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings DARPA Information Survivability Conference and Exposition","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W23278639","https://openalex.org/W1561027652","https://openalex.org/W2097270175","https://openalex.org/W2129466958","https://openalex.org/W2143014896","https://openalex.org/W2799095925","https://openalex.org/W6680858319"],"related_works":["https://openalex.org/W3121667336","https://openalex.org/W2492640494","https://openalex.org/W4379054516","https://openalex.org/W2384877859","https://openalex.org/W2392961223","https://openalex.org/W2386423843","https://openalex.org/W1484464798","https://openalex.org/W2795328844","https://openalex.org/W2795100819","https://openalex.org/W2502697733"],"abstract_inverted_index":{"Measures":[0],"to":[1,5,26,44],"safeguard":[2],"or":[3],"respond":[4],"a":[6,10,63,114],"cyber":[7],"attack":[8],"against":[9],"BMC/sup":[11,46,68],"3/":[12,47,69],"enterprise":[13,73],"will":[14],"invariably":[15],"disrupt":[16],"the":[17,28,41,67],"missions":[18],"supported":[19],"by":[20],"that":[21,39,71,107],"system.":[22],"We":[23,61,75,86],"would":[24],"like":[25],"predict":[27],"impacts":[29],"of":[30,94,117],"those":[31,81],"disruptions":[32],"beforehand":[33],"and":[34,105,119],"select":[35],"information":[36],"assurance":[37],"measures":[38],"minimize":[40],"disruptions,":[42],"especially":[43],"key":[45],"functions.":[48],"In":[49],"this":[50,108],"paper":[51],"we":[52],"present":[53],"an":[54,72,91],"analysis":[55],"method":[56,109],"based":[57],"on":[58],"perturbation":[59],"analysis.":[60,99],"develop":[62],"workflow":[64],"model":[65],"for":[66,80],"functions":[70,82],"conducts.":[74],"record":[76],"representative":[77],"processing":[78],"histories":[79],"under":[83],"nominal":[84],"conditions.":[85],"evaluate":[87],"off-nominal":[88,111],"conditions":[89],"using":[90],"improved":[92],"form":[93],"Cassandras'":[95],"(1993)":[96],"path":[97],"reconstruction":[98],"Initial":[100],"computational":[101],"results":[102],"are":[103],"encouraging,":[104],"indicate":[106],"predicts":[110],"performance":[112],"with":[113],"high":[115],"degree":[116],"fidelity,":[118],"is":[120],"substantially":[121],"faster":[122],"than":[123],"discrete-event":[124],"simulation.":[125]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
