Abstract
A review of network science and complexity theory as they apply to the ability of systems to resist stress and recover from faults.
- Adamic, L.A. et al. Power-law distribution of the World Wide Web. Science 287, 5461 (2000), 2115.Google Scholar
- Albert, R., Jeong, H., and Barabási, A-L. The Internet's Achilles' Heel: Error and attack tolerance of complex networks. Nature 406 (2000).Google Scholar
- Bak, P., Tang, C., and Wiesenfeld, K. Self-organized criticality: An explanation of 1/f noise. Physical Review Letters 59 (July 1987), 381--384.Google ScholarCross Ref
- Bak, P. How Nature Works: The Science of Self-Organized Criticality, Copernicus Press, New York, NY (1996).Google ScholarCross Ref
- Barabási, A-L and Bonabeau, E. Scale-free networks. Scientific American 288, 5 (May 2003), 60--69.Google ScholarCross Ref
- Carter, A.B. Definition of the term Complex Catastrophe, Department of Defense Memorandum (February 19, 2013).Google Scholar
- Eldredge, N. and Gould, S.J. Punctuated equilibria: An alternative to phyletic gradualism. In Models in Paleobiology, T.J.M. Schopf, Ed. Freeman Cooper, San Francisco (1972), 82--115.Google Scholar
- Gao, J., Barzel, B., and Barabási, A-L. Universal resilience patterns in complex networks. Nature 530 (2016), 307--312.Google ScholarCross Ref
- Kott, A. and Linkov. I., eds. Cyber Resilience of Systems and Networks. Springer, Switzerland (2019).Google ScholarCross Ref
- Lewis, T.G. Bak's Sand Pile: Strategies for a Catastrophic World. Agile Press, California (2011), 382.Google Scholar
- Lewis, T.G. Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation. 3rd ed., John Wiley & Sons, (2014).Google Scholar
- Perrow, C. Normal Accidents: Living With High-Risk Technologies. Princeton University Press (1999).Google Scholar
- Taleb, N.N. The Black Swan: The Impact of the Highly Improbable. Random House (2007).Google Scholar
Index Terms
- The Many Faces of Resilience
Recommendations
How to find many collisions of 3-pass HAVAL
IWSEC'07: Proceedings of the Security 2nd international conference on Advances in information and computer securityThe hash function HAVAL is a well known Merkle-Damgård hash function such as MD4 and MD5. It has three variants, 3-, 4- and 5-pass HAVAL. On 3-pass HAVAL, the best known attack finds a collision pair with 27 computations of the compression function. To ...
Resilience to distinguishing attacks on WG-7 cipher and their generalizations
The stream cipher WG-7 is a lightweight variant of the well-known Welch- Gong (WG) stream cipher family, targeted to resource-constrained devices like RFID tags, smart cards, and wireless sensor nodes. Recently, a distinguishing attack was discovered ...
Network Resilience: A Measure of Network Fault Tolerance
A probabilistic measure of network fault tolerance expressed as the probability of a disconnection is proposed. Qualitative evaluation of this measure is presented. As expected, the single-node disconnection probability is the dominant factor ...
Comments