Visible to the public Biblio

Filters: Keyword is Enterprise Resilience  [Clear All Filters]
2022-08-26
Nedosekin, Alexey O., Abdoulaeva, Zinaida I., Zhuk, Alexander E., Konnikov, Evgenii A..  2021.  Resilience Management of an Industrial Enterprise in the Face of Uncertainty. 2021 XXIV International Conference on Soft Computing and Measurements (SCM). :215—217.
Purpose: Determine the main theoretical aspects of managing the resilience of an industrial enterprise in conditions of uncertainty. Method: The static control methods include the technology of the matrix aggregate computer (MAC) and the R-lenses, and the dynamic control methods - the technology based on the 4x6 matrix model. All these methods are based on the results of the theory of fuzzy sets and soft computing. Result: A comparative analysis of the resilience of 82 largest industrial enterprises in five industry classes was carried out, R-lenses were constructed for these classes, and the main factors affecting the resilience of industrial companies were evaluated. Conclusions: The central problem points in assessing and ensuring the resilience of enterprises are: a) correct modeling of external disturbances; b) ensuring the statistical homogeneity of the source data array.
VanYe, Christopher M., Li, Beatrice E., Koch, Andrew T., Luu, Mai N., Adekunle, Rahman O., Moghadasi, Negin, Collier, Zachary A., Polmateer, Thomas L., Barnes, David, Slutzky, David et al..  2021.  Trust and Security of Embedded Smart Devices in Advanced Logistics Systems. 2021 Systems and Information Engineering Design Symposium (SIEDS). :1—6.

This paper addresses security and risk management of hardware and embedded systems across several applications. There are three companies involved in the research. First is an energy technology company that aims to leverage electric- vehicle batteries through vehicle to grid (V2G) services in order to provide energy storage for electric grids. Second is a defense contracting company that provides acquisition support for the DOD's conventional prompt global strike program (CPGS). These systems need protections in their production and supply chains, as well as throughout their system life cycles. Third is a company that deals with trust and security in advanced logistics systems generally. The rise of interconnected devices has led to growth in systems security issues such as privacy, authentication, and secure storage of data. A risk analysis via scenario-based preferences is aided by a literature review and industry experts. The analysis is divided into various sections of Criteria, Initiatives, C-I Assessment, Emergent Conditions (EC), Criteria-Scenario (C-S) relevance and EC Grouping. System success criteria, research initiatives, and risks to the system are compiled. In the C-I Assessment, a rating is assigned to signify the degree to which criteria are addressed by initiatives, including research and development, government programs, industry resources, security countermeasures, education and training, etc. To understand risks of emergent conditions, a list of Potential Scenarios is developed across innovations, environments, missions, populations and workforce behaviors, obsolescence, adversaries, etc. The C-S Relevance rates how the scenarios affect the relevance of the success criteria, including cost, schedule, security, return on investment, and cascading effects. The Emergent Condition Grouping (ECG) collates the emergent conditions with the scenarios. The generated results focus on ranking Initiatives based on their ability to negate the effects of Emergent Conditions, as well as producing a disruption score to compare a Potential Scenario's impacts to the ranking of Initiatives. The results presented in this paper are applicable to the testing and evaluation of security and risk for a variety of embedded smart devices and should be of interest to developers, owners, and operators of critical infrastructure systems.