{"id":"https://openalex.org/W2098267199","doi":"https://doi.org/10.1109/hase.2004.1281767","title":"Managing secure survivable critical infrastructures to avoid vulnerabilities","display_name":"Managing secure survivable critical infrastructures to avoid vulnerabilities","publication_year":2004,"publication_date":"2004-06-10","ids":{"openalex":"https://openalex.org/W2098267199","doi":"https://doi.org/10.1109/hase.2004.1281767","mag":"2098267199"},"language":"en","primary_location":{"id":"doi:10.1109/hase.2004.1281767","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hase.2004.1281767","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Eighth IEEE International Symposium on High Assurance Systems Engineering, 2004. Proceedings.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019549865","display_name":"Frederick T. Sheldon","orcid":"https://orcid.org/0000-0003-1241-2750"},"institutions":[{"id":"https://openalex.org/I1289243028","display_name":"Oak Ridge National Laboratory","ror":"https://ror.org/01qz5mb56","country_code":"US","type":"facility","lineage":["https://openalex.org/I1289243028","https://openalex.org/I1330989302","https://openalex.org/I39565521","https://openalex.org/I4210159294"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"F. Sheldon","raw_affiliation_strings":["Applied Software Engineering Research, Oak Ridge National Laboratory, Oak Ridge, TN, USA","Appl. Software Eng. Res., Oak Ridge Nat. Lab., TN, USA"],"affiliations":[{"raw_affiliation_string":"Applied Software Engineering Research, Oak Ridge National Laboratory, Oak Ridge, TN, USA","institution_ids":["https://openalex.org/I1289243028"]},{"raw_affiliation_string":"Appl. Software Eng. Res., Oak Ridge Nat. Lab., TN, USA","institution_ids":["https://openalex.org/I1289243028"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000241304","display_name":"Thomas E. Potok","orcid":"https://orcid.org/0000-0001-6687-3435"},"institutions":[{"id":"https://openalex.org/I1289243028","display_name":"Oak Ridge National Laboratory","ror":"https://ror.org/01qz5mb56","country_code":"US","type":"facility","lineage":["https://openalex.org/I1289243028","https://openalex.org/I1330989302","https://openalex.org/I39565521","https://openalex.org/I4210159294"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"T. Potok","raw_affiliation_strings":["Applied Software Engineering Research, Oak Ridge National Laboratory, Oak Ridge, TN, USA","Appl. Software Eng. Res., Oak Ridge Nat. Lab., TN, USA"],"affiliations":[{"raw_affiliation_string":"Applied Software Engineering Research, Oak Ridge National Laboratory, Oak Ridge, TN, USA","institution_ids":["https://openalex.org/I1289243028"]},{"raw_affiliation_string":"Appl. Software Eng. Res., Oak Ridge Nat. Lab., TN, USA","institution_ids":["https://openalex.org/I1289243028"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019800639","display_name":"Andy Loebl","orcid":null},"institutions":[{"id":"https://openalex.org/I1289243028","display_name":"Oak Ridge National Laboratory","ror":"https://ror.org/01qz5mb56","country_code":"US","type":"facility","lineage":["https://openalex.org/I1289243028","https://openalex.org/I1330989302","https://openalex.org/I39565521","https://openalex.org/I4210159294"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"A. Loebl","raw_affiliation_strings":["Applied Software Engineering Research, Oak Ridge National Laboratory, Oak Ridge, TN, USA","Appl. Software Eng. Res., Oak Ridge Nat. Lab., TN, USA"],"affiliations":[{"raw_affiliation_string":"Applied Software Engineering Research, Oak Ridge National Laboratory, Oak Ridge, TN, USA","institution_ids":["https://openalex.org/I1289243028"]},{"raw_affiliation_string":"Appl. Software Eng. Res., Oak Ridge Nat. Lab., TN, USA","institution_ids":["https://openalex.org/I1289243028"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044912704","display_name":"Axel Krings","orcid":"https://orcid.org/0000-0002-8988-4695"},"institutions":[{"id":"https://openalex.org/I155093810","display_name":"University of Idaho","ror":"https://ror.org/03hbp5t65","country_code":"US","type":"education","lineage":["https://openalex.org/I155093810"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"A. Krings","raw_affiliation_strings":["Department of Computer Science, University of Idaho, Moscow, ID, USA","[Department of Computer Science, University of Idaho, Moscow, ID]"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Idaho, Moscow, ID, USA","institution_ids":["https://openalex.org/I155093810"]},{"raw_affiliation_string":"[Department of Computer Science, University of Idaho, Moscow, ID]","institution_ids":["https://openalex.org/I155093810"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080858916","display_name":"Paul Oman","orcid":"https://orcid.org/0000-0001-8328-363X"},"institutions":[{"id":"https://openalex.org/I155093810","display_name":"University of Idaho","ror":"https://ror.org/03hbp5t65","country_code":"US","type":"education","lineage":["https://openalex.org/I155093810"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"P. Oman","raw_affiliation_strings":["Department of Computer Science, University of Idaho, Moscow, ID, USA","[Department of Computer Science, University of Idaho, Moscow, ID]"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Idaho, Moscow, ID, USA","institution_ids":["https://openalex.org/I155093810"]},{"raw_affiliation_string":"[Department of Computer Science, University of Idaho, Moscow, ID]","institution_ids":["https://openalex.org/I155093810"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5019549865"],"corresponding_institution_ids":["https://openalex.org/I1289243028"],"apc_list":null,"apc_paid":null,"fwci":0.2493,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.66102094,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"7","issue":null,"first_page":"293","last_page":"296"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/survivability","display_name":"Survivability","score":0.7454656958580017},{"id":"https://openalex.org/keywords/blackout","display_name":"Blackout","score":0.6926602125167847},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6682842969894409},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.6011909246444702},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5703219771385193},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5018115043640137},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.4963424801826477},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.47296446561813354},{"id":"https://openalex.org/keywords/interim","display_name":"Interim","score":0.4634183943271637},{"id":"https://openalex.org/keywords/domino-effect","display_name":"Domino effect","score":0.45833614468574524},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.4448167681694031},{"id":"https://openalex.org/keywords/critical-infrastructure-protection","display_name":"Critical infrastructure protection","score":0.43538615107536316},{"id":"https://openalex.org/keywords/cascading-failure","display_name":"Cascading failure","score":0.42181020975112915},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.4140242338180542},{"id":"https://openalex.org/keywords/electric-power-system","display_name":"Electric power system","score":0.39838358759880066},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.29915857315063477},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.26434779167175293},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.21756196022033691}],"concepts":[{"id":"https://openalex.org/C2781133158","wikidata":"https://www.wikidata.org/wiki/Q1088669","display_name":"Survivability","level":2,"score":0.7454656958580017},{"id":"https://openalex.org/C2777693866","wikidata":"https://www.wikidata.org/wiki/Q359099","display_name":"Blackout","level":4,"score":0.6926602125167847},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6682842969894409},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.6011909246444702},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5703219771385193},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5018115043640137},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.4963424801826477},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.47296446561813354},{"id":"https://openalex.org/C2776957806","wikidata":"https://www.wikidata.org/wiki/Q4895105","display_name":"Interim","level":2,"score":0.4634183943271637},{"id":"https://openalex.org/C155223936","wikidata":"https://www.wikidata.org/wiki/Q682875","display_name":"Domino effect","level":2,"score":0.45833614468574524},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.4448167681694031},{"id":"https://openalex.org/C2779033394","wikidata":"https://www.wikidata.org/wiki/Q5186733","display_name":"Critical infrastructure protection","level":3,"score":0.43538615107536316},{"id":"https://openalex.org/C119323957","wikidata":"https://www.wikidata.org/wiki/Q5048226","display_name":"Cascading failure","level":4,"score":0.42181020975112915},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4140242338180542},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.39838358759880066},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.29915857315063477},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.26434779167175293},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.21756196022033691},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C185544564","wikidata":"https://www.wikidata.org/wiki/Q81197","display_name":"Nuclear physics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/hase.2004.1281767","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hase.2004.1281767","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Eighth IEEE International Symposium on High Assurance Systems Engineering, 2004. Proceedings.","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.135.4696","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.135.4696","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.uidaho.edu/~krings/publications/HASE04.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.595.4298","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.595.4298","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.csm.ornl.gov/~sheldon/public/SheldonF-Survivable3.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6200000047683716,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W35840224","https://openalex.org/W114593455","https://openalex.org/W240630320","https://openalex.org/W1524217192","https://openalex.org/W1649157701","https://openalex.org/W1812585128","https://openalex.org/W1912117489","https://openalex.org/W1994158575","https://openalex.org/W2010967907","https://openalex.org/W2042265434","https://openalex.org/W2139773283","https://openalex.org/W2150968089","https://openalex.org/W2153043255","https://openalex.org/W2157665429","https://openalex.org/W4213192141","https://openalex.org/W4256422764","https://openalex.org/W6601475254","https://openalex.org/W6604656009","https://openalex.org/W6609212490","https://openalex.org/W6638458131"],"related_works":["https://openalex.org/W2166444520","https://openalex.org/W1652234666","https://openalex.org/W2169338999","https://openalex.org/W2905977148","https://openalex.org/W2317494659","https://openalex.org/W2387838046","https://openalex.org/W2977054953","https://openalex.org/W3008933944","https://openalex.org/W3033996367","https://openalex.org/W2999320329"],"abstract_inverted_index":{"Information":[0],"systems":[1,23,108,123],"now":[2],"form":[3],"the":[4,48,55,82,119,133],"backbone":[5],"of":[6,32,54,59,88,105,121],"nearly":[7],"every":[8],"government":[9],"and":[10,34,43,50,66,70,111],"private":[11],"system":[12],"-":[13],"from":[14],"targeting":[15],"weapons":[16],"to":[17,74,109,125],"conducting":[18],"financial":[19],"transactions.":[20],"Increasingly":[21],"these":[22,38],"are":[24,40],"networked":[25],"together":[26],"allowing":[27],"for":[28,47],"distributed":[29,107],"operations,":[30],"sharing":[31],"databases,":[33],"redundant":[35],"capability.":[36],"Ensuring":[37],"networks":[39],"secure,":[41],"robust,":[42],"reliable":[44],"is":[45],"critical":[46],"strategic":[49],"economic":[51],"well":[52],"being":[53],"Nation.":[56],"The":[57,77,102],"blackout":[58],"August":[60],"14,":[61],"2003":[62],"affected":[63],"8":[64],"states":[65],"fifty":[67],"million":[68],"people":[69],"could":[71],"cost":[72],"up":[73],"$5":[75],"billion.":[76],"DOE/NERC":[78],"interim":[79],"reports":[80],"indicate":[81],"outage":[83],"progressed":[84],"as":[85],"a":[86,99],"chain":[87],"relatively":[89],"minor":[90],"events":[91],"consistent":[92],"with":[93],"previous":[94],"cascading":[95],"outages":[96],"caused":[97],"by":[98],"domino":[100],"reaction.":[101],"increasing":[103],"use":[104],"embedded":[106],"manage":[110],"control":[112],"our":[113],"technologically":[114],"complex":[115],"society":[116],"makes":[117],"knowing":[118],"vulnerability":[120],"such":[122],"essential":[124],"improving":[126],"their":[127],"intrinsic":[128],"reliability/survivability.":[129],"Our":[130],"discussion":[131],"employs":[132],"power":[134],"transmission":[135],"grid.":[136]},"counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
