A model‐based systems engineering approach to critical infrastructure vulnerability assessment and decision analysis
Securing critical infrastructure against attack presents significant challenges. As new infrastructure is built and existing infrastructure is maintained, a method to assess the vulnerabilities and support decision makers in determining the best use of security resources is needed. In response to th...
Saved in:
Published in | Systems engineering Vol. 22; no. 2; pp. 114 - 133 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Hoboken
Wiley Subscription Services, Inc
01.03.2019
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Securing
critical infrastructure against attack presents significant challenges. As new infrastructure is built and existing infrastructure is maintained, a method to assess the vulnerabilities and support decision makers in determining the best use of security resources is needed. In response to this need, this research develops a methodology for performing vulnerability assessment and decision analysis of critical infrastructure using model‐based systems engineering, an approach that has not been applied to this problem. The approach presented allows architects to link regulatory requirements, system architecture, subject matter expert opinion and attack vectors to a Department of Defense Architecture Framework (DoDAF)‐based model that allows decision makers to evaluate system vulnerability and determine alternatives to securing their systems based on their budget constraints. The decision analysis is done using an integer linear program that is integrated with DoDAF to provide solutions for how to allocate scarce security resources. Securing an electrical substation is used as an illustrative case study to demonstrate the methodology. The case study shows that the method presented here can be used to answer key questions, for example, what security resources should a decision maker invest in based on their budget constraints? Results show that the modeling and analysis approach provides a means to effectively evaluate the infrastructure vulnerability and presents a set of security alternatives for decision makers to choose from, based on their vulnerabilities and budget profile. |
---|---|
AbstractList | Securing
critical infrastructure against attack presents significant challenges. As new infrastructure is built and existing infrastructure is maintained, a method to assess the vulnerabilities and support decision makers in determining the best use of security resources is needed. In response to this need, this research develops a methodology for performing vulnerability assessment and decision analysis of critical infrastructure using model‐based systems engineering, an approach that has not been applied to this problem. The approach presented allows architects to link regulatory requirements, system architecture, subject matter expert opinion and attack vectors to a Department of Defense Architecture Framework (DoDAF)‐based model that allows decision makers to evaluate system vulnerability and determine alternatives to securing their systems based on their budget constraints. The decision analysis is done using an integer linear program that is integrated with DoDAF to provide solutions for how to allocate scarce security resources. Securing an electrical substation is used as an illustrative case study to demonstrate the methodology. The case study shows that the method presented here can be used to answer key questions, for example,
what security resources should a decision maker invest in based on their budget constraints?
Results show that the modeling and analysis approach provides a means to effectively evaluate the infrastructure vulnerability and presents a set of security alternatives for decision makers to choose from, based on their vulnerabilities and budget profile. Securing critical infrastructure against attack presents significant challenges. As new infrastructure is built and existing infrastructure is maintained, a method to assess the vulnerabilities and support decision makers in determining the best use of security resources is needed. In response to this need, this research develops a methodology for performing vulnerability assessment and decision analysis of critical infrastructure using model‐based systems engineering, an approach that has not been applied to this problem. The approach presented allows architects to link regulatory requirements, system architecture, subject matter expert opinion and attack vectors to a Department of Defense Architecture Framework (DoDAF)‐based model that allows decision makers to evaluate system vulnerability and determine alternatives to securing their systems based on their budget constraints. The decision analysis is done using an integer linear program that is integrated with DoDAF to provide solutions for how to allocate scarce security resources. Securing an electrical substation is used as an illustrative case study to demonstrate the methodology. The case study shows that the method presented here can be used to answer key questions, for example, what security resources should a decision maker invest in based on their budget constraints? Results show that the modeling and analysis approach provides a means to effectively evaluate the infrastructure vulnerability and presents a set of security alternatives for decision makers to choose from, based on their vulnerabilities and budget profile. Securingcritical infrastructure against attack presents significant challenges. As new infrastructure is built and existing infrastructure is maintained, a method to assess the vulnerabilities and support decision makers in determining the best use of security resources is needed. In response to this need, this research develops a methodology for performing vulnerability assessment and decision analysis of critical infrastructure using model‐based systems engineering, an approach that has not been applied to this problem. The approach presented allows architects to link regulatory requirements, system architecture, subject matter expert opinion and attack vectors to a Department of Defense Architecture Framework (DoDAF)‐based model that allows decision makers to evaluate system vulnerability and determine alternatives to securing their systems based on their budget constraints. The decision analysis is done using an integer linear program that is integrated with DoDAF to provide solutions for how to allocate scarce security resources. Securing an electrical substation is used as an illustrative case study to demonstrate the methodology. The case study shows that the method presented here can be used to answer key questions, for example, what security resources should a decision maker invest in based on their budget constraints? Results show that the modeling and analysis approach provides a means to effectively evaluate the infrastructure vulnerability and presents a set of security alternatives for decision makers to choose from, based on their vulnerabilities and budget profile. |
Author | Medal, Hugh Huff, Johnathon Griendling, Kelly |
Author_xml | – sequence: 1 givenname: Johnathon orcidid: 0000-0003-4739-082X surname: Huff fullname: Huff, Johnathon email: johnathon.huff@gmail.com organization: Mississippi State University – sequence: 2 givenname: Hugh surname: Medal fullname: Medal, Hugh organization: Mississippi State University – sequence: 3 givenname: Kelly surname: Griendling fullname: Griendling, Kelly organization: Georgia Institute of Technology |
BookMark | eNp9kLtOxDAQRS0EEs-CP7BERZHFztMpEeIlrUQBFFTR2JksXiXO4nFA6fgEvpEvIctSIUE1M9K5V3PvPtt2vUPGjqWYSSHiMxppFss0F1tsT2axiHKVqe1pF6WKZJzKXbZPtBRCCinFHns9511fY_v5_qGBsOaTQcCOOLqFdYjeugWH1cr3YJ556LnxNlgDLbeu8UDBDyYMHvnr0Dr0oG1rw8iBCIk6dIGDq3mNxpLt3XRAO5KlQ7bTQEt49DMP2OPV5cPFTTS_u769OJ9HJkkzEYEqpIE8LcA0UMYaZKM0yrSstVFFUpo8U0aA0IXKddKIEkysm1iXhUmLAkRywE42vlOAlwEpVMt-8NMTVMVSKZlluVpTpxvK-J7IY1OtvO3Aj5UU1brWamql-q51Ys9-scYGCFO44MG2_ynebIvj39bV_dP9RvEF1eGQHQ |
CitedBy_id | crossref_primary_10_1155_2022_7808127 crossref_primary_10_3390_systems7030044 crossref_primary_10_1002_sys_21549 crossref_primary_10_1002_sys_21515 crossref_primary_10_1109_ACCESS_2020_2990190 crossref_primary_10_3390_app13106225 crossref_primary_10_1155_2020_7534819 crossref_primary_10_1061_JTEPBS_0000610 crossref_primary_10_1002_sys_21633 crossref_primary_10_1109_TEM_2022_3181268 crossref_primary_10_3390_systems12090336 crossref_primary_10_1002_dac_4397 crossref_primary_10_1080_13669877_2023_2181858 |
Cites_doi | 10.1016/j.autcon.2009.10.005 10.1109/SYSCON.2016.7490649 10.1145/1878537.1878717 10.1177/875647930600300204 10.1002/sys.21253 10.1002/9780470185810 10.1201/b12061 10.1117/12.2177141 10.1002/sys.20125 10.1109/SYSCON.2011.5929083 10.1002/sys.20180 10.1201/9781420066296.pt2 10.1109/SYSTEMS.2008.4518997 10.1109/AERO.2011.5747654 10.2514/6.2008-5910 10.2514/6.2015-4575 10.1109/JSYST.2013.2270573 10.1109/WSC.2013.6721660 10.1109/SYSOSE.2015.7151965 |
ContentType | Journal Article |
Copyright | 2018 Wiley Periodicals, Inc. 2019 Wiley Periodicals, Inc. |
Copyright_xml | – notice: 2018 Wiley Periodicals, Inc. – notice: 2019 Wiley Periodicals, Inc. |
DBID | AAYXX CITATION 7SC 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D |
DOI | 10.1002/sys.21460 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database ProQuest Computer Science Collection Civil Engineering Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Civil Engineering Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | CrossRef Civil Engineering Abstracts |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1520-6858 |
EndPage | 133 |
ExternalDocumentID | 10_1002_sys_21460 SYS21460 |
Genre | article |
GroupedDBID | .3N .GA .Y3 05W 0R~ 10A 123 1L6 1OC 31~ 33P 3SF 3WU 50Y 50Z 51W 51X 52M 52N 52O 52P 52S 52T 52U 52W 52X 5VS 66C 702 7PT 8-0 8-1 8-3 8-4 8-5 8UM 930 A03 AAESR AAEVG AAHHS AAHQN AAHYS AAMNL AANHP AANLZ AAONW AASGY AAXRX AAYCA AAZKR ABCQN ABCUV ABDBF ABEML ABIJN ABPVW ABUCO ACAHQ ACBWZ ACCFJ ACCZN ACGFS ACIWK ACPOU ACRPL ACSCC ACUHS ACXBN ACXQS ACYXJ ADBBV ADEOM ADIZJ ADKYN ADMGS ADNMO ADOZA ADXAS ADZMN AEEZP AEIGN AEIMD AENEX AEQDE AEUQT AEUYR AFBPY AFFPM AFGKR AFPWT AFWVQ AFZJQ AHBTC AITYG AIURR AIWBW AJBDE AJXKR ALAGY ALMA_UNASSIGNED_HOLDINGS ALUQN ALVPJ AMBMR AMYDB ASPBG ATUGU AUFTA AVWKF AZBYB AZFZN AZVAB BAFTC BDRZF BFHJK BHBCM BMNLL BMXJE BNHUX BROTX BRXPI BY8 CS3 D-E D-F DCZOG DPXWK DR2 DRFUL DRSTM DU5 ESX F00 F01 F04 FEDTE G-S G.N GNP GODZA H.T H.X HBH HGLYW HVGLF HZ~ I-F IX1 J0M JPC KQQ LATKE LAW LC2 LC3 LEEKS LH4 LITHE LOXES LP6 LP7 LUTES LW6 LYRES MEWTI MK4 MK~ MRFUL MRSTM MSFUL MSSTM MXFUL MXSTM N04 N05 N9A NF~ O66 O9- OIG P2P P2W P2X P4D Q.N Q11 QB0 QRW R.K ROL RWI RX1 RYL SUPJJ TUS UB1 V2E W8V W99 WBKPD WIH WIK WLBEL WOHZO WQJ WRC WXSBR WYISQ XG1 XPP XV2 ZZTAW ~IA ~WT AAYXX ABJNI ADMLS AEYWJ AGHNM AGQPQ AGYGG CITATION 7SC 7TB 8FD AAMMB AEFGJ AGXDD AIDQK AIDYY FR3 JQ2 KR7 L7M L~C L~D |
ID | FETCH-LOGICAL-c3450-a871ca647acfa92ba1f8be149dbc8739c658c0a0b786b3f09ac2bf2b97c477a03 |
IEDL.DBID | DR2 |
ISSN | 1098-1241 |
IngestDate | Fri Jul 25 10:08:20 EDT 2025 Thu Apr 24 23:10:31 EDT 2025 Tue Jul 01 01:43:59 EDT 2025 Wed Jan 22 16:38:18 EST 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 2 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c3450-a871ca647acfa92ba1f8be149dbc8739c658c0a0b786b3f09ac2bf2b97c477a03 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0003-4739-082X |
PQID | 2188155680 |
PQPubID | 1046377 |
PageCount | 20 |
ParticipantIDs | proquest_journals_2188155680 crossref_primary_10_1002_sys_21460 crossref_citationtrail_10_1002_sys_21460 wiley_primary_10_1002_sys_21460_SYS21460 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | March 2019 |
PublicationDateYYYYMMDD | 2019-03-01 |
PublicationDate_xml | – month: 03 year: 2019 text: March 2019 |
PublicationDecade | 2010 |
PublicationPlace | Hoboken |
PublicationPlace_xml | – name: Hoboken |
PublicationTitle | Systems engineering |
PublicationYear | 2019 |
Publisher | Wiley Subscription Services, Inc |
Publisher_xml | – name: Wiley Subscription Services, Inc |
References | 2013; 16 2012 2011 2010 2009 2008 2007 2006 2016 2015 402 2014 2011; 14 2013 2013; 8 Xia X (e_1_2_6_12_1) e_1_2_6_32_1 e_1_2_6_10_1 e_1_2_6_31_1 e_1_2_6_30_1 e_1_2_6_19_1 e_1_2_6_13_1 e_1_2_6_36_1 e_1_2_6_14_1 e_1_2_6_35_1 e_1_2_6_11_1 e_1_2_6_34_1 e_1_2_6_33_1 e_1_2_6_17_1 e_1_2_6_18_1 e_1_2_6_15_1 e_1_2_6_16_1 e_1_2_6_37_1 e_1_2_6_21_1 e_1_2_6_20_1 Brinkman B (e_1_2_6_24_1) 2015 e_1_2_6_9_1 Mittal S (e_1_2_6_5_1) 2006 e_1_2_6_8_1 e_1_2_6_4_1 e_1_2_6_7_1 e_1_2_6_6_1 e_1_2_6_25_1 e_1_2_6_3_1 e_1_2_6_23_1 e_1_2_6_2_1 e_1_2_6_22_1 e_1_2_6_29_1 e_1_2_6_28_1 e_1_2_6_27_1 e_1_2_6_26_1 |
References_xml | – volume: 16 start-page: 363 year: 2013 end-page: 377 article-title: A data‐centric capability‐focused approach for system‐of‐systems architecture modeling and analysis publication-title: Syst Eng. – year: 2011 – start-page: 95 year: 2006 end-page: 123 article-title: Extending DoDAF to allow integrated DEVS‐based modeling and simulation publication-title: J Defense Model Simul: Applic, Methodol, Technol 3.2 – start-page: 221 year: 2010 end-page: 234 article-title: Optimizing the planning of construction site security for critical infrastructure projects publication-title: Autom Constr 19.2 – start-page: 2.1 year: 2009 end-page: 2.17 – start-page: 2914 year: 2013 end-page: 2922 – year: 2007 – year: 2008 – start-page: 182 year: 2011 end-page: 188 – year: 2006 – start-page: 312 year: 2009 end-page: 343 article-title: Service oriented architectures, the DoD architecture framework 1.5, and executable architectures publication-title: Syst Eng 12.4 – volume: 8 start-page: 4 issue: 1 year: 2013 end-page: 13 article-title: A Novel Executable Modeling Approach for System‐of‐Systems Architecture publication-title: IEEE Systems Journal – volume: 14 start-page: 305 year: 2011 end-page: 326 article-title: Model based systems engineering with department of defense architectural framework publication-title: Syst Eng – start-page: 1 year: 2016 end-page: 7 – year: 2014 – year: 2015 – year: 2010 – volume: 402 – year: 2012 – ident: e_1_2_6_20_1 – ident: e_1_2_6_23_1 – ident: e_1_2_6_26_1 – ident: e_1_2_6_34_1 – ident: e_1_2_6_14_1 doi: 10.1016/j.autcon.2009.10.005 – ident: e_1_2_6_11_1 doi: 10.1109/SYSCON.2016.7490649 – ident: e_1_2_6_17_1 doi: 10.1145/1878537.1878717 – start-page: 95 year: 2006 ident: e_1_2_6_5_1 article-title: Extending DoDAF to allow integrated DEVS‐based modeling and simulation publication-title: J Defense Model Simul: Applic, Methodol, Technol 3.2 doi: 10.1177/875647930600300204 – ident: e_1_2_6_29_1 – ident: e_1_2_6_13_1 doi: 10.1002/sys.21253 – ident: e_1_2_6_28_1 – ident: e_1_2_6_32_1 doi: 10.1002/9780470185810 – ident: e_1_2_6_31_1 doi: 10.1201/b12061 – ident: e_1_2_6_21_1 doi: 10.1117/12.2177141 – ident: e_1_2_6_7_1 – ident: e_1_2_6_8_1 doi: 10.1002/sys.20125 – ident: e_1_2_6_19_1 doi: 10.1109/SYSCON.2011.5929083 – ident: e_1_2_6_36_1 – ident: e_1_2_6_3_1 doi: 10.1002/sys.20180 – volume-title: California Public Utilities Commission year: 2015 ident: e_1_2_6_24_1 – ident: e_1_2_6_25_1 – ident: e_1_2_6_33_1 – ident: e_1_2_6_2_1 – ident: e_1_2_6_30_1 – ident: e_1_2_6_15_1 doi: 10.1201/9781420066296.pt2 – ident: e_1_2_6_27_1 – ident: e_1_2_6_9_1 doi: 10.1109/SYSTEMS.2008.4518997 – ident: e_1_2_6_37_1 doi: 10.1109/AERO.2011.5747654 – ident: e_1_2_6_16_1 – ident: e_1_2_6_4_1 doi: 10.2514/6.2008-5910 – ident: e_1_2_6_22_1 doi: 10.2514/6.2015-4575 – ident: e_1_2_6_35_1 – ident: e_1_2_6_6_1 doi: 10.1109/JSYST.2013.2270573 – volume-title: Communications in Computer and Information Science ident: e_1_2_6_12_1 – ident: e_1_2_6_18_1 doi: 10.1109/WSC.2013.6721660 – ident: e_1_2_6_10_1 doi: 10.1109/SYSOSE.2015.7151965 |
SSID | ssj0010110 |
Score | 2.2496703 |
Snippet | Securing
critical infrastructure against attack presents significant challenges. As new infrastructure is built and existing infrastructure is maintained, a... Securingcritical infrastructure against attack presents significant challenges. As new infrastructure is built and existing infrastructure is maintained, a... |
SourceID | proquest crossref wiley |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 114 |
SubjectTerms | Architectural engineering Budgeting Budgets Computer architecture Constraint modelling Critical infrastructure critical infrastructure vulnerability assessment Decision analysis Decision making Infrastructure integer linear program model‐based systems engineering Security Substations system architecture Systems engineering |
Title | A model‐based systems engineering approach to critical infrastructure vulnerability assessment and decision analysis |
URI | https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fsys.21460 https://www.proquest.com/docview/2188155680 |
Volume | 22 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnZ1LS8NAEICX0pMefIvVKot46CVtstk0WTwVsRRBD9ZCBSHs82JppWkL9eRP8Df6S9xHklZREG8JOwnJzmxmJpl8A8BFomOgQOhMlSmJPKx9nscwwZ7kIpRchpjaXgS3d-3eAN8Mo2EFXBb_wjg-RPnCzawM-7w2C5yyrLWChmbLrGm6Upt83dRqmYDovkRHBcav2S-dRGdJ2k0VVCEftcojv_qiVYC5HqZaP9PdBk_FFbrykufmfMaa_PUbvPGft7ADtvL4E3acweyCihzvgc01KuE-WHSg7Y_z8fZufJyAjvacQbmSggWLHM4mkOftEqC21il1RNr5VMLFfGSY1rb8dglpyQCFdCygyJv76B2HRTkAg-71w1XPy9szeDzEke9RnWtx2sYx5YoSxGigEiZ1xiUYT-KQcB3ccJ_6LE7aLFQ-oRwxhRiJOY5j6oeHoDqejOURgEwwIaJQ0TgRJqGlCScBR4lCWEWchjXQKBSV8pxdblpojFJHXUapnonUTmUNnJeiLw7Y8ZNQvdB2mq9ZM6IN1wDZ9HDDqu33E6T9x77dOP676AnY0NEWcQVsdVDV2pCnOqKZsTNrup_Cufer |
linkProvider | Wiley-Blackwell |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnZ1LT8JAEMc3BA_qwbcRRd0YD1wKpV1om3ghRoIKHAQSPJhmX71IwPBK8ORH8DP6SZzdbQsaTYy3Nt027c5sZ2a7_f0RuvQhByoLqFRZJB2LQMyzGAmIJblwJZcuoVqLoNWuNnrkrl_pZ9BV8i-M4UOkE25qZOj3tRrgakK6tKSGThaTopKlhoJ9TSl664LqIYVHlVVk0986A6iTIFAlXCHbKaWnfo1GyxRzNVHVkaa-jZ6SezQLTJ6Lsykr8tdv-Mb_PsQO2opTUFwzPrOLMnK4hzZXwIT7aF7DWiLn4-1dhTmBDfB5guWyFU5w5Hg6wjxWTMDgsGNqoLSzscTz2UBhrfUK3AWmKQYU06HAItb3gR1DRjlAvfpN97phxQoNFndJxbYolFucVolHeUQDh9Fy5DMJRZdg3PfcgEN-w21qM8-vMjeyA8odFjks8DjxPGq7hyg7HA3lEcJMMCEqbkQ9X6ialvo8KHPHjxwSVTh1c6iQWCrkMb5cqWgMQgNedkLoiVB3ZQ5dpE1fDLPjp0b5xNxhPGzVEfBdxWSDwwVtt98vEHYeO3rj-O9Nz9F6o9tqhs3b9v0J2oDkKzDr2fIoC5aRp5DgTNmZ9uNPIsP7xg |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnZ1LS8NAEICXoiB68C1Wqy7iwUtqmmybBE_FWnwWsRYUhLDPi6UtfUE9-RP8jf4SZ3eTtIqCeAkJOwmbndnMTLL5BqGjEGKgkoBMlSnpOQR8nsNIRBzJhS-59Ak1tQhuG5WLFrl6LD_m0Gn6L4zlQ2Qv3PTMMM9rPcF7Qp1MoaGDyaCoq1JDvj4P21CbdO0-Y0eVtGMznzojSJPAT6VYIdc7yU796oymEeZsnGocTX0FPaddtOtLXoqjISvy12_0xn_ewypaTgJQXLUWs4ZysrOOlmawhBtoXMWmQM7H27t2cgJb3PMAy6kUTmHkeNjFPKmXgMFc-9QiaUd9icejtoZam_W3E0wzCCimHYFFUt0HDiwXZRO16ucPZxdOUp_B4T4puw6FZIvTCgkoVzTyGC2pkElIuQTjYeBHHKIb7lKXBWGF-cqNKPeY8lgUcBIE1PW30Fyn25HbCDPBhCj7igah0BktDXlU4l6oPKLKnPp5dJwqKuYJvFzX0GjHFrvsxTASsRnKPDrMRHuW2PGTUCHVdpxMWt0ClquJbNB8bNT2-wXi5lPT7Oz8XfQALdzV6vHNZeN6Fy1C5BXZxWwFNAeKkXsQ3QzZvrHiT2Gk-n4 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+model%E2%80%90based+systems+engineering+approach+to+critical+infrastructure+vulnerability+assessment+and+decision+analysis&rft.jtitle=Systems+engineering&rft.au=Huff%2C+Johnathon&rft.au=Medal%2C+Hugh&rft.au=Griendling%2C+Kelly&rft.date=2019-03-01&rft.pub=Wiley+Subscription+Services%2C+Inc&rft.issn=1098-1241&rft.eissn=1520-6858&rft.volume=22&rft.issue=2&rft.spage=114&rft.epage=133&rft_id=info:doi/10.1002%2Fsys.21460&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1098-1241&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1098-1241&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1098-1241&client=summon |