{"id":"https://openalex.org/W4398186312","doi":"https://doi.org/10.1145/3605098.3636066","title":"Methodology for Resiliency Analysis of Mission-critical Systems","display_name":"Methodology for Resiliency Analysis of Mission-critical Systems","publication_year":2024,"publication_date":"2024-04-08","ids":{"openalex":"https://openalex.org/W4398186312","doi":"https://doi.org/10.1145/3605098.3636066"},"language":"en","primary_location":{"id":"doi:10.1145/3605098.3636066","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3605098.3636066","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3605098.3636066","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3605098.3636066","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065621092","display_name":"Mahmoud Abdelgawad","orcid":"https://orcid.org/0000-0002-9407-6342"},"institutions":[{"id":"https://openalex.org/I92446798","display_name":"Colorado State University","ror":"https://ror.org/03k1gpj17","country_code":"US","type":"education","lineage":["https://openalex.org/I92446798"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mahmoud Abdelgawad","raw_affiliation_strings":["Department of Computer Science, Colorado State University, Fort Collins, CO, United States"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Colorado State University, Fort Collins, CO, United States","institution_ids":["https://openalex.org/I92446798"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008904412","display_name":"Indrakshi Ray","orcid":"https://orcid.org/0000-0002-0714-7676"},"institutions":[{"id":"https://openalex.org/I92446798","display_name":"Colorado State University","ror":"https://ror.org/03k1gpj17","country_code":"US","type":"education","lineage":["https://openalex.org/I92446798"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Indrakshi Ray","raw_affiliation_strings":["Department of Computer Science, Colorado State University, Fort Collins, CO, United States"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Colorado State University, Fort Collins, CO, United States","institution_ids":["https://openalex.org/I92446798"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5065621092"],"corresponding_institution_ids":["https://openalex.org/I92446798"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07159624,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1292","last_page":"1300"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11357","display_name":"Risk and Safety Analysis","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1804","display_name":"Statistics, Probability and Uncertainty"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11357","display_name":"Risk and Safety Analysis","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1804","display_name":"Statistics, Probability and Uncertainty"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10780","display_name":"Reliability and Maintenance Optimization","score":0.9836999773979187,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5428412556648254},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.3877372145652771},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2057954967021942}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5428412556648254},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.3877372145652771},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2057954967021942}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3605098.3636066","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3605098.3636066","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3605098.3636066","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3605098.3636066","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3605098.3636066","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3605098.3636066","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.4000000059604645,"id":"https://metadata.un.org/sdg/13","display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4398186312.pdf"},"referenced_works_count":7,"referenced_works":["https://openalex.org/W947673137","https://openalex.org/W1556898525","https://openalex.org/W1568573127","https://openalex.org/W2075597034","https://openalex.org/W2088843301","https://openalex.org/W2803703736","https://openalex.org/W4387198063"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"Mission-critical":[0],"systems":[1,13],"ensure":[2],"the":[3,91,99,117,147,159,163,171,174,182,206,226,237],"safety":[4],"and":[5,29,33,55,62,186],"security":[6],"of":[7,93,130,162,173,213,228,240],"any":[8],"nation.":[9],"Attacks":[10],"on":[11],"mission-critical":[12,69,82,214,229],"can":[14,24,133],"have":[15],"devastating":[16],"consequences.":[17],"We":[18],"need":[19],"to":[20,31,52,64,125,150,167,169,193,220,224,243],"design":[21,41,151],"missions":[22,42],"that":[23,43,132,205],"prevent,":[25],"detect,":[26],"survive,":[27],"recover,":[28],"respond":[30],"faults":[32],"cyber":[34,245],"attacks.":[35],"In":[36],"other":[37],"words,":[38],"we":[39],"must":[40,49],"are":[44,60,123,141],"cyber-resilient.":[45],"System":[46],"engineering":[47],"techniques":[48],"be":[50,134],"used":[51,124],"specify,":[53],"analyze,":[54],"understand":[56],"where":[57],"adverse":[58],"events":[59],"possible":[61],"how":[63,219],"mitigate":[65],"them":[66],"while":[67],"a":[68,88,94,127,194,199,222],"system":[70,197],"is":[71,187,191,208],"deployed.":[72],"This":[73],"work":[74],"introduces":[75],"an":[76],"end-to-end":[77],"methodology":[78,85,111,156,190,207,217,232],"for":[79,210],"designing":[80],"cyber-resilient":[81],"systems.":[83,215,230],"The":[84,110,120,155,189,202,216,231],"first":[86],"specifies":[87],"mission":[89,100,118,149,165,183,223,241],"in":[90,136,146,178,236],"form":[92,126],"workflow.":[95],"It":[96,176],"then":[97],"converts":[98],"workflow":[101],"into":[102,143],"formal":[103,128],"representation":[104],"using":[105],"Coloured":[106],"Petri":[107],"Nets":[108],"(CPN).":[109],"also":[112],"derives":[113],"threat":[114,121],"models":[115,122],"from":[116],"specification.":[119],"specification":[129,242],"attacks":[131,140,168],"represented":[135],"CPN.":[137],"These":[138],"CPN":[139,148,164],"plugged":[142],"potential":[144],"places":[145],"various":[152],"attack":[153],"scenarios.":[154],"finally":[157],"verifies":[158],"state":[160,180],"transitions":[161],"attached":[166],"analyze":[170],"resiliency":[172,211,227],"mission.":[175],"identifies":[177],"which":[179],"transition":[181],"succeeds,":[184],"fails,":[185],"incomplete.":[188],"applied":[192],"drone":[195],"surveillance":[196],"as":[198],"motivating":[200],"example.":[201],"result":[203],"shows":[204],"practical":[209],"analysis":[212],"demonstrates":[218],"restrict":[221],"improve":[225],"provides":[233],"crucial":[234],"insights":[235],"early":[238],"stages":[239],"achieve":[244],"resiliency.":[246]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
