Paper:
A Framework for Robust and Resilient Critical Infrastructure Systems
Jagdish Chandra
The Institute for Reliability and Risk Analysis, The George Washington University, Washington, DC 20052, U.S.A
- [1] R. Alo, A. deKorvin, and F. Modave, “Decision making for robust and resilient systems,” Proc. HICSS 36, 2003.
- [2] J. Chandra, “Distributed and decentralized information fusion,” Proc. IconIT’2001, pp. 1-11, 2001.
- [3] J. Chandra, “Information fusion for critical infrastructure systems,” Proc. SMi’s Fifth Annual Conference on Military Data Fusion, Sept., 2003.
- [4] J. Chandra, and G. Ladde, “Stability analysis of stochastic hybrid systems,” Intern. Jour. Of Hybrid Systems, 4, pp. 179-198, 2004.
- [5] M. Grabisch, H. Nguyen, and E. Walker, “Fundamentals of Uncertainty Calculi with Applications to Fuzzy Inference,” Kluwer Academic Publications, 1994.
- [6] R. Kearfott, and V. Kreinovich, “Application of Interval Computations,” Kluwer Academic Publications, 1996.
- [7] F. Modave, and P. Eklund, “A measurement theory perspective for MCDM,” Prcoc. IEEE Fuzzy Systems Conference, pp. 1068-1071, 2001.
- [8] R. Rinaldi, “Modeling and simulating critical infrastructures and their interdependencies,” Proc. HICSS-37, 2004.
- [9] G. Shafer, “A Mathematical Theory of Evidence,” Princeton University Press, 1976.
- [10] N. Singpurwalla, and J. Booker, “ Membership functions and probability measures of fuzzy sets,” The Amer. Statistician, 99, pp. 867-889, 2004.
- [11] P. Varshney, “Distributed Detection and Data Fusion,” Springer, 1996.
- [12] W. Wright, R. Smith, R. Danek, and P. Greenway, “A generalisable measure of self-organization and emergence,” Artificial Neural Networks-ICANN, Springer, pp. 857-864, 2001.
- [13] L. Zadeh, “Fuzzy sets as a basis for a theory of possibility,” Fuzzy Sets and Systems, 1, pp. 3-28, 1978.
- [14] L. Zadeh, “Towards a perception-based theory of probabilistic reasoning with imprecise probabilities,” Jour. Stat. Planning and Inference, 105, pp. 233-264, 2002.
- [15] “Report: Electric Power Risk assessment,” National Security Telecommunication Advisory Committee, 1997.
This article is published under a Creative Commons Attribution-NoDerivatives 4.0 Internationa License.