Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Inoperability Input-Output Model for Interdependent Infrastructure Sectors. I: Theory and Methodology
- Y. Haimes, B. Horowitz, J. Lambert, J. Santos, C. Lian, K. Crowther
- Engineering
- 1 June 2005
The paper discusses the theory and methodology supporting the development of the inoperability input-output model (IIM). The IIM is based on Leontief’s input-output model, which characterizes… Expand
Inoperability Input-Output Model for Interdependent Infrastructure Sectors. II: Case Studies
- Y. Haimes, B. Horowitz, J. Lambert, J. Santos, K. Crowther, C. Lian
- Engineering
- 1 June 2005
The paper discusses case studies of the inoperability input-output model (IIM) for modeling impacts of willful attacks on interdependent sectors. The IIM is a model for assessing sector… Expand
A Macro-Economic Framework for Evaluation of Cyber Security Risks Related to Protection of Intellectual Property
- E. Andrijcic, B. Horowitz
- Business, Medicine
- Risk analysis : an official publication of the…
- 1 August 2006
The article is based on the premise that, from a macro-economic viewpoint, cyber attacks with long-lasting effects are the most economically significant, and as a result require more attention than… Expand
The potential for underinvestment in internet security: implications for regulatory policy
- A. Garcia, B. Horowitz
- Business, Computer Science
- WEIS
- 8 January 2007
TLDR
Economic costs of firm‐level information infrastructure failures: Estimates from field studies in manufacturing supply chains
- S. Dynes, M. Johnson, E. Andrijcic, B. Horowitz
- Business
- 13 November 2007
Purpose – This paper presents a method for estimating the macro‐economic cost of a firm‐level information system disruption within a supply chain.Design/methodology/approach – The authors combine… Expand
Adaptive Two-Player Hierarchical Holographic Modeling Game for Counterterrorism Intelligence Analysis
- Y. Haimes, B. Horowitz
- Engineering
- 1 June 2004
Intelligence gathering and analysis for countering terrorism is a vital and costly venture; therefore approaches need to be explored that can help determine the scope of collection and improve the… Expand
A System-Aware Cyber Security architecture
- R. A. Jones, B. Horowitz
- Computer Science
- Syst. Eng.
- 1 June 2012
TLDR
The Importance of Architecture in DoD Software
- B. Horowitz
- Engineering
- 1 September 1994
Abstract : This paper argues that in the face of declining military budgets and increasingly diverse threats, the key to making defense systems more flexible, while keeping costs down, is to procure… Expand
Homeland security preparedness: Balancing protection with resilience in emergent systems
- Y. Haimes, K. Crowther, B. Horowitz
- Computer Science
- Syst. Eng.
- 2008
TLDR
Risk-based methodology for scenario tracking, intelligence gathering, and analysis for countering terrorism
- B. Horowitz, Y. Haimes
- Computer Science
- 2003
TLDR