A model‐based systems engineering approach to critical infrastructure vulnerability assessment and decision analysis

Securing critical infrastructure against attack presents significant challenges. As new infrastructure is built and existing infrastructure is maintained, a method to assess the vulnerabilities and support decision makers in determining the best use of security resources is needed. In response to th...

Full description

Saved in:
Bibliographic Details
Published inSystems engineering Vol. 22; no. 2; pp. 114 - 133
Main Authors Huff, Johnathon, Medal, Hugh, Griendling, Kelly
Format Journal Article
LanguageEnglish
Published Hoboken Wiley Subscription Services, Inc 01.03.2019
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Securing critical infrastructure against attack presents significant challenges. As new infrastructure is built and existing infrastructure is maintained, a method to assess the vulnerabilities and support decision makers in determining the best use of security resources is needed. In response to this need, this research develops a methodology for performing vulnerability assessment and decision analysis of critical infrastructure using model‐based systems engineering, an approach that has not been applied to this problem. The approach presented allows architects to link regulatory requirements, system architecture, subject matter expert opinion and attack vectors to a Department of Defense Architecture Framework (DoDAF)‐based model that allows decision makers to evaluate system vulnerability and determine alternatives to securing their systems based on their budget constraints. The decision analysis is done using an integer linear program that is integrated with DoDAF to provide solutions for how to allocate scarce security resources. Securing an electrical substation is used as an illustrative case study to demonstrate the methodology. The case study shows that the method presented here can be used to answer key questions, for example, what security resources should a decision maker invest in based on their budget constraints? Results show that the modeling and analysis approach provides a means to effectively evaluate the infrastructure vulnerability and presents a set of security alternatives for decision makers to choose from, based on their vulnerabilities and budget profile.
AbstractList Securing critical infrastructure against attack presents significant challenges. As new infrastructure is built and existing infrastructure is maintained, a method to assess the vulnerabilities and support decision makers in determining the best use of security resources is needed. In response to this need, this research develops a methodology for performing vulnerability assessment and decision analysis of critical infrastructure using model‐based systems engineering, an approach that has not been applied to this problem. The approach presented allows architects to link regulatory requirements, system architecture, subject matter expert opinion and attack vectors to a Department of Defense Architecture Framework (DoDAF)‐based model that allows decision makers to evaluate system vulnerability and determine alternatives to securing their systems based on their budget constraints. The decision analysis is done using an integer linear program that is integrated with DoDAF to provide solutions for how to allocate scarce security resources. Securing an electrical substation is used as an illustrative case study to demonstrate the methodology. The case study shows that the method presented here can be used to answer key questions, for example, what security resources should a decision maker invest in based on their budget constraints? Results show that the modeling and analysis approach provides a means to effectively evaluate the infrastructure vulnerability and presents a set of security alternatives for decision makers to choose from, based on their vulnerabilities and budget profile.
Securing critical infrastructure against attack presents significant challenges. As new infrastructure is built and existing infrastructure is maintained, a method to assess the vulnerabilities and support decision makers in determining the best use of security resources is needed. In response to this need, this research develops a methodology for performing vulnerability assessment and decision analysis of critical infrastructure using model‐based systems engineering, an approach that has not been applied to this problem. The approach presented allows architects to link regulatory requirements, system architecture, subject matter expert opinion and attack vectors to a Department of Defense Architecture Framework (DoDAF)‐based model that allows decision makers to evaluate system vulnerability and determine alternatives to securing their systems based on their budget constraints. The decision analysis is done using an integer linear program that is integrated with DoDAF to provide solutions for how to allocate scarce security resources. Securing an electrical substation is used as an illustrative case study to demonstrate the methodology. The case study shows that the method presented here can be used to answer key questions, for example, what security resources should a decision maker invest in based on their budget constraints? Results show that the modeling and analysis approach provides a means to effectively evaluate the infrastructure vulnerability and presents a set of security alternatives for decision makers to choose from, based on their vulnerabilities and budget profile.
Securingcritical infrastructure against attack presents significant challenges. As new infrastructure is built and existing infrastructure is maintained, a method to assess the vulnerabilities and support decision makers in determining the best use of security resources is needed. In response to this need, this research develops a methodology for performing vulnerability assessment and decision analysis of critical infrastructure using model‐based systems engineering, an approach that has not been applied to this problem. The approach presented allows architects to link regulatory requirements, system architecture, subject matter expert opinion and attack vectors to a Department of Defense Architecture Framework (DoDAF)‐based model that allows decision makers to evaluate system vulnerability and determine alternatives to securing their systems based on their budget constraints. The decision analysis is done using an integer linear program that is integrated with DoDAF to provide solutions for how to allocate scarce security resources. Securing an electrical substation is used as an illustrative case study to demonstrate the methodology. The case study shows that the method presented here can be used to answer key questions, for example, what security resources should a decision maker invest in based on their budget constraints? Results show that the modeling and analysis approach provides a means to effectively evaluate the infrastructure vulnerability and presents a set of security alternatives for decision makers to choose from, based on their vulnerabilities and budget profile.
Author Medal, Hugh
Huff, Johnathon
Griendling, Kelly
Author_xml – sequence: 1
  givenname: Johnathon
  orcidid: 0000-0003-4739-082X
  surname: Huff
  fullname: Huff, Johnathon
  email: johnathon.huff@gmail.com
  organization: Mississippi State University
– sequence: 2
  givenname: Hugh
  surname: Medal
  fullname: Medal, Hugh
  organization: Mississippi State University
– sequence: 3
  givenname: Kelly
  surname: Griendling
  fullname: Griendling, Kelly
  organization: Georgia Institute of Technology
BookMark eNp9kLtOxDAQRS0EEs-CP7BERZHFztMpEeIlrUQBFFTR2JksXiXO4nFA6fgEvpEvIctSIUE1M9K5V3PvPtt2vUPGjqWYSSHiMxppFss0F1tsT2axiHKVqe1pF6WKZJzKXbZPtBRCCinFHns9511fY_v5_qGBsOaTQcCOOLqFdYjeugWH1cr3YJ556LnxNlgDLbeu8UDBDyYMHvnr0Dr0oG1rw8iBCIk6dIGDq3mNxpLt3XRAO5KlQ7bTQEt49DMP2OPV5cPFTTS_u769OJ9HJkkzEYEqpIE8LcA0UMYaZKM0yrSstVFFUpo8U0aA0IXKddKIEkysm1iXhUmLAkRywE42vlOAlwEpVMt-8NMTVMVSKZlluVpTpxvK-J7IY1OtvO3Aj5UU1brWamql-q51Ys9-scYGCFO44MG2_ynebIvj39bV_dP9RvEF1eGQHQ
CitedBy_id crossref_primary_10_1155_2022_7808127
crossref_primary_10_3390_systems7030044
crossref_primary_10_1002_sys_21549
crossref_primary_10_1002_sys_21515
crossref_primary_10_1109_ACCESS_2020_2990190
crossref_primary_10_3390_app13106225
crossref_primary_10_1155_2020_7534819
crossref_primary_10_1061_JTEPBS_0000610
crossref_primary_10_1002_sys_21633
crossref_primary_10_1109_TEM_2022_3181268
crossref_primary_10_3390_systems12090336
crossref_primary_10_1002_dac_4397
crossref_primary_10_1080_13669877_2023_2181858
Cites_doi 10.1016/j.autcon.2009.10.005
10.1109/SYSCON.2016.7490649
10.1145/1878537.1878717
10.1177/875647930600300204
10.1002/sys.21253
10.1002/9780470185810
10.1201/b12061
10.1117/12.2177141
10.1002/sys.20125
10.1109/SYSCON.2011.5929083
10.1002/sys.20180
10.1201/9781420066296.pt2
10.1109/SYSTEMS.2008.4518997
10.1109/AERO.2011.5747654
10.2514/6.2008-5910
10.2514/6.2015-4575
10.1109/JSYST.2013.2270573
10.1109/WSC.2013.6721660
10.1109/SYSOSE.2015.7151965
ContentType Journal Article
Copyright 2018 Wiley Periodicals, Inc.
2019 Wiley Periodicals, Inc.
Copyright_xml – notice: 2018 Wiley Periodicals, Inc.
– notice: 2019 Wiley Periodicals, Inc.
DBID AAYXX
CITATION
7SC
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
DOI 10.1002/sys.21460
DatabaseName CrossRef
Computer and Information Systems Abstracts
Mechanical & Transportation Engineering Abstracts
Technology Research Database
Engineering Research Database
ProQuest Computer Science Collection
Civil Engineering Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Civil Engineering Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Mechanical & Transportation Engineering Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList CrossRef

Civil Engineering Abstracts
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1520-6858
EndPage 133
ExternalDocumentID 10_1002_sys_21460
SYS21460
Genre article
GroupedDBID .3N
.GA
.Y3
05W
0R~
10A
123
1L6
1OC
31~
33P
3SF
3WU
50Y
50Z
51W
51X
52M
52N
52O
52P
52S
52T
52U
52W
52X
5VS
66C
702
7PT
8-0
8-1
8-3
8-4
8-5
8UM
930
A03
AAESR
AAEVG
AAHHS
AAHQN
AAHYS
AAMNL
AANHP
AANLZ
AAONW
AASGY
AAXRX
AAYCA
AAZKR
ABCQN
ABCUV
ABDBF
ABEML
ABIJN
ABPVW
ABUCO
ACAHQ
ACBWZ
ACCFJ
ACCZN
ACGFS
ACIWK
ACPOU
ACRPL
ACSCC
ACUHS
ACXBN
ACXQS
ACYXJ
ADBBV
ADEOM
ADIZJ
ADKYN
ADMGS
ADNMO
ADOZA
ADXAS
ADZMN
AEEZP
AEIGN
AEIMD
AENEX
AEQDE
AEUQT
AEUYR
AFBPY
AFFPM
AFGKR
AFPWT
AFWVQ
AFZJQ
AHBTC
AITYG
AIURR
AIWBW
AJBDE
AJXKR
ALAGY
ALMA_UNASSIGNED_HOLDINGS
ALUQN
ALVPJ
AMBMR
AMYDB
ASPBG
ATUGU
AUFTA
AVWKF
AZBYB
AZFZN
AZVAB
BAFTC
BDRZF
BFHJK
BHBCM
BMNLL
BMXJE
BNHUX
BROTX
BRXPI
BY8
CS3
D-E
D-F
DCZOG
DPXWK
DR2
DRFUL
DRSTM
DU5
ESX
F00
F01
F04
FEDTE
G-S
G.N
GNP
GODZA
H.T
H.X
HBH
HGLYW
HVGLF
HZ~
I-F
IX1
J0M
JPC
KQQ
LATKE
LAW
LC2
LC3
LEEKS
LH4
LITHE
LOXES
LP6
LP7
LUTES
LW6
LYRES
MEWTI
MK4
MK~
MRFUL
MRSTM
MSFUL
MSSTM
MXFUL
MXSTM
N04
N05
N9A
NF~
O66
O9-
OIG
P2P
P2W
P2X
P4D
Q.N
Q11
QB0
QRW
R.K
ROL
RWI
RX1
RYL
SUPJJ
TUS
UB1
V2E
W8V
W99
WBKPD
WIH
WIK
WLBEL
WOHZO
WQJ
WRC
WXSBR
WYISQ
XG1
XPP
XV2
ZZTAW
~IA
~WT
AAYXX
ABJNI
ADMLS
AEYWJ
AGHNM
AGQPQ
AGYGG
CITATION
7SC
7TB
8FD
AAMMB
AEFGJ
AGXDD
AIDQK
AIDYY
FR3
JQ2
KR7
L7M
L~C
L~D
ID FETCH-LOGICAL-c3450-a871ca647acfa92ba1f8be149dbc8739c658c0a0b786b3f09ac2bf2b97c477a03
IEDL.DBID DR2
ISSN 1098-1241
IngestDate Fri Jul 25 10:08:20 EDT 2025
Thu Apr 24 23:10:31 EDT 2025
Tue Jul 01 01:43:59 EDT 2025
Wed Jan 22 16:38:18 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c3450-a871ca647acfa92ba1f8be149dbc8739c658c0a0b786b3f09ac2bf2b97c477a03
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-4739-082X
PQID 2188155680
PQPubID 1046377
PageCount 20
ParticipantIDs proquest_journals_2188155680
crossref_primary_10_1002_sys_21460
crossref_citationtrail_10_1002_sys_21460
wiley_primary_10_1002_sys_21460_SYS21460
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate March 2019
PublicationDateYYYYMMDD 2019-03-01
PublicationDate_xml – month: 03
  year: 2019
  text: March 2019
PublicationDecade 2010
PublicationPlace Hoboken
PublicationPlace_xml – name: Hoboken
PublicationTitle Systems engineering
PublicationYear 2019
Publisher Wiley Subscription Services, Inc
Publisher_xml – name: Wiley Subscription Services, Inc
References 2013; 16
2012
2011
2010
2009
2008
2007
2006
2016
2015
402
2014
2011; 14
2013
2013; 8
Xia X (e_1_2_6_12_1)
e_1_2_6_32_1
e_1_2_6_10_1
e_1_2_6_31_1
e_1_2_6_30_1
e_1_2_6_19_1
e_1_2_6_13_1
e_1_2_6_36_1
e_1_2_6_14_1
e_1_2_6_35_1
e_1_2_6_11_1
e_1_2_6_34_1
e_1_2_6_33_1
e_1_2_6_17_1
e_1_2_6_18_1
e_1_2_6_15_1
e_1_2_6_16_1
e_1_2_6_37_1
e_1_2_6_21_1
e_1_2_6_20_1
Brinkman B (e_1_2_6_24_1) 2015
e_1_2_6_9_1
Mittal S (e_1_2_6_5_1) 2006
e_1_2_6_8_1
e_1_2_6_4_1
e_1_2_6_7_1
e_1_2_6_6_1
e_1_2_6_25_1
e_1_2_6_3_1
e_1_2_6_23_1
e_1_2_6_2_1
e_1_2_6_22_1
e_1_2_6_29_1
e_1_2_6_28_1
e_1_2_6_27_1
e_1_2_6_26_1
References_xml – volume: 16
  start-page: 363
  year: 2013
  end-page: 377
  article-title: A data‐centric capability‐focused approach for system‐of‐systems architecture modeling and analysis
  publication-title: Syst Eng.
– year: 2011
– start-page: 95
  year: 2006
  end-page: 123
  article-title: Extending DoDAF to allow integrated DEVS‐based modeling and simulation
  publication-title: J Defense Model Simul: Applic, Methodol, Technol 3.2
– start-page: 221
  year: 2010
  end-page: 234
  article-title: Optimizing the planning of construction site security for critical infrastructure projects
  publication-title: Autom Constr 19.2
– start-page: 2.1
  year: 2009
  end-page: 2.17
– start-page: 2914
  year: 2013
  end-page: 2922
– year: 2007
– year: 2008
– start-page: 182
  year: 2011
  end-page: 188
– year: 2006
– start-page: 312
  year: 2009
  end-page: 343
  article-title: Service oriented architectures, the DoD architecture framework 1.5, and executable architectures
  publication-title: Syst Eng 12.4
– volume: 8
  start-page: 4
  issue: 1
  year: 2013
  end-page: 13
  article-title: A Novel Executable Modeling Approach for System‐of‐Systems Architecture
  publication-title: IEEE Systems Journal
– volume: 14
  start-page: 305
  year: 2011
  end-page: 326
  article-title: Model based systems engineering with department of defense architectural framework
  publication-title: Syst Eng
– start-page: 1
  year: 2016
  end-page: 7
– year: 2014
– year: 2015
– year: 2010
– volume: 402
– year: 2012
– ident: e_1_2_6_20_1
– ident: e_1_2_6_23_1
– ident: e_1_2_6_26_1
– ident: e_1_2_6_34_1
– ident: e_1_2_6_14_1
  doi: 10.1016/j.autcon.2009.10.005
– ident: e_1_2_6_11_1
  doi: 10.1109/SYSCON.2016.7490649
– ident: e_1_2_6_17_1
  doi: 10.1145/1878537.1878717
– start-page: 95
  year: 2006
  ident: e_1_2_6_5_1
  article-title: Extending DoDAF to allow integrated DEVS‐based modeling and simulation
  publication-title: J Defense Model Simul: Applic, Methodol, Technol 3.2
  doi: 10.1177/875647930600300204
– ident: e_1_2_6_29_1
– ident: e_1_2_6_13_1
  doi: 10.1002/sys.21253
– ident: e_1_2_6_28_1
– ident: e_1_2_6_32_1
  doi: 10.1002/9780470185810
– ident: e_1_2_6_31_1
  doi: 10.1201/b12061
– ident: e_1_2_6_21_1
  doi: 10.1117/12.2177141
– ident: e_1_2_6_7_1
– ident: e_1_2_6_8_1
  doi: 10.1002/sys.20125
– ident: e_1_2_6_19_1
  doi: 10.1109/SYSCON.2011.5929083
– ident: e_1_2_6_36_1
– ident: e_1_2_6_3_1
  doi: 10.1002/sys.20180
– volume-title: California Public Utilities Commission
  year: 2015
  ident: e_1_2_6_24_1
– ident: e_1_2_6_25_1
– ident: e_1_2_6_33_1
– ident: e_1_2_6_2_1
– ident: e_1_2_6_30_1
– ident: e_1_2_6_15_1
  doi: 10.1201/9781420066296.pt2
– ident: e_1_2_6_27_1
– ident: e_1_2_6_9_1
  doi: 10.1109/SYSTEMS.2008.4518997
– ident: e_1_2_6_37_1
  doi: 10.1109/AERO.2011.5747654
– ident: e_1_2_6_16_1
– ident: e_1_2_6_4_1
  doi: 10.2514/6.2008-5910
– ident: e_1_2_6_22_1
  doi: 10.2514/6.2015-4575
– ident: e_1_2_6_35_1
– ident: e_1_2_6_6_1
  doi: 10.1109/JSYST.2013.2270573
– volume-title: Communications in Computer and Information Science
  ident: e_1_2_6_12_1
– ident: e_1_2_6_18_1
  doi: 10.1109/WSC.2013.6721660
– ident: e_1_2_6_10_1
  doi: 10.1109/SYSOSE.2015.7151965
SSID ssj0010110
Score 2.2496703
Snippet Securing critical infrastructure against attack presents significant challenges. As new infrastructure is built and existing infrastructure is maintained, a...
Securingcritical infrastructure against attack presents significant challenges. As new infrastructure is built and existing infrastructure is maintained, a...
SourceID proquest
crossref
wiley
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 114
SubjectTerms Architectural engineering
Budgeting
Budgets
Computer architecture
Constraint modelling
Critical infrastructure
critical infrastructure vulnerability assessment
Decision analysis
Decision making
Infrastructure
integer linear program
model‐based systems engineering
Security
Substations
system architecture
Systems engineering
Title A model‐based systems engineering approach to critical infrastructure vulnerability assessment and decision analysis
URI https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fsys.21460
https://www.proquest.com/docview/2188155680
Volume 22
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnZ1LS8NAEICX0pMefIvVKot46CVtstk0WTwVsRRBD9ZCBSHs82JppWkL9eRP8Df6S9xHklZREG8JOwnJzmxmJpl8A8BFomOgQOhMlSmJPKx9nscwwZ7kIpRchpjaXgS3d-3eAN8Mo2EFXBb_wjg-RPnCzawM-7w2C5yyrLWChmbLrGm6Upt83dRqmYDovkRHBcav2S-dRGdJ2k0VVCEftcojv_qiVYC5HqZaP9PdBk_FFbrykufmfMaa_PUbvPGft7ADtvL4E3acweyCihzvgc01KuE-WHSg7Y_z8fZufJyAjvacQbmSggWLHM4mkOftEqC21il1RNr5VMLFfGSY1rb8dglpyQCFdCygyJv76B2HRTkAg-71w1XPy9szeDzEke9RnWtx2sYx5YoSxGigEiZ1xiUYT-KQcB3ccJ_6LE7aLFQ-oRwxhRiJOY5j6oeHoDqejOURgEwwIaJQ0TgRJqGlCScBR4lCWEWchjXQKBSV8pxdblpojFJHXUapnonUTmUNnJeiLw7Y8ZNQvdB2mq9ZM6IN1wDZ9HDDqu33E6T9x77dOP676AnY0NEWcQVsdVDV2pCnOqKZsTNrup_Cufer
linkProvider Wiley-Blackwell
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnZ1LT8JAEMc3BA_qwbcRRd0YD1wKpV1om3ghRoIKHAQSPJhmX71IwPBK8ORH8DP6SZzdbQsaTYy3Nt027c5sZ2a7_f0RuvQhByoLqFRZJB2LQMyzGAmIJblwJZcuoVqLoNWuNnrkrl_pZ9BV8i-M4UOkE25qZOj3tRrgakK6tKSGThaTopKlhoJ9TSl664LqIYVHlVVk0986A6iTIFAlXCHbKaWnfo1GyxRzNVHVkaa-jZ6SezQLTJ6Lsykr8tdv-Mb_PsQO2opTUFwzPrOLMnK4hzZXwIT7aF7DWiLn4-1dhTmBDfB5guWyFU5w5Hg6wjxWTMDgsGNqoLSzscTz2UBhrfUK3AWmKQYU06HAItb3gR1DRjlAvfpN97phxQoNFndJxbYolFucVolHeUQDh9Fy5DMJRZdg3PfcgEN-w21qM8-vMjeyA8odFjks8DjxPGq7hyg7HA3lEcJMMCEqbkQ9X6ialvo8KHPHjxwSVTh1c6iQWCrkMb5cqWgMQgNedkLoiVB3ZQ5dpE1fDLPjp0b5xNxhPGzVEfBdxWSDwwVtt98vEHYeO3rj-O9Nz9F6o9tqhs3b9v0J2oDkKzDr2fIoC5aRp5DgTNmZ9uNPIsP7xg
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnZ1LS8NAEICXoiB68C1Wqy7iwUtqmmybBE_FWnwWsRYUhLDPi6UtfUE9-RP8jf4SZ3eTtIqCeAkJOwmbndnMTLL5BqGjEGKgkoBMlSnpOQR8nsNIRBzJhS-59Ak1tQhuG5WLFrl6LD_m0Gn6L4zlQ2Qv3PTMMM9rPcF7Qp1MoaGDyaCoq1JDvj4P21CbdO0-Y0eVtGMznzojSJPAT6VYIdc7yU796oymEeZsnGocTX0FPaddtOtLXoqjISvy12_0xn_ewypaTgJQXLUWs4ZysrOOlmawhBtoXMWmQM7H27t2cgJb3PMAy6kUTmHkeNjFPKmXgMFc-9QiaUd9icejtoZam_W3E0wzCCimHYFFUt0HDiwXZRO16ucPZxdOUp_B4T4puw6FZIvTCgkoVzTyGC2pkElIuQTjYeBHHKIb7lKXBWGF-cqNKPeY8lgUcBIE1PW30Fyn25HbCDPBhCj7igah0BktDXlU4l6oPKLKnPp5dJwqKuYJvFzX0GjHFrvsxTASsRnKPDrMRHuW2PGTUCHVdpxMWt0ClquJbNB8bNT2-wXi5lPT7Oz8XfQALdzV6vHNZeN6Fy1C5BXZxWwFNAeKkXsQ3QzZvrHiT2Gk-n4
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+model%E2%80%90based+systems+engineering+approach+to+critical+infrastructure+vulnerability+assessment+and+decision+analysis&rft.jtitle=Systems+engineering&rft.au=Huff%2C+Johnathon&rft.au=Medal%2C+Hugh&rft.au=Griendling%2C+Kelly&rft.date=2019-03-01&rft.pub=Wiley+Subscription+Services%2C+Inc&rft.issn=1098-1241&rft.eissn=1520-6858&rft.volume=22&rft.issue=2&rft.spage=114&rft.epage=133&rft_id=info:doi/10.1002%2Fsys.21460&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1098-1241&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1098-1241&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1098-1241&client=summon