scispace - formally typeset
A

Alexander Kott

Researcher at United States Army Research Laboratory

Publications -  142
Citations -  2175

Alexander Kott is an academic researcher from United States Army Research Laboratory. The author has contributed to research in topics: Command and control & Resilience (network). The author has an hindex of 21, co-authored 135 publications receiving 1716 citations. Previous affiliations of Alexander Kott include Carnegie Learning & United States Department of the Army.

Papers
More filters
Journal ArticleDOI

Resilience metrics for cyber systems

TL;DR: A generic approach is proposed that could integrate actual data, technical judgment, and literature-based measures to assess system resilience across physical, information, cognitive, and social domains and link national policy goals to specific system measures, such that resource allocation decisions can be translated into actionable interventions and investments.
Journal ArticleDOI

Operational resilience: Concepts, design and analysis

TL;DR: This study proposes quantitative measures that capture and implement the definition of engineering resilience advanced by the National Academy of Sciences, and indicates that desired resilience and robustness levels are achievable by trading off different design parameters.
Journal ArticleDOI

The Internet of Battle Things

TL;DR: On the battlefields of the future, multitudes of intelligent things will be communicating, acting, and collaborating with one another and with human warfighters as discussed by the authors, which will demand major advances in science and technology.
BookDOI

Adversarial Reasoning: Computational Approaches to Reading the Opponent's Mind

TL;DR: The notion of a syntactic interface of systems and system components, by which communication lines, which the authors call channels, the system or a system component is connected to the environment and which messages are communicated over the channels is introduced.
Book ChapterDOI

Fundamental Concepts of Cyber Resilience: Introduction and Overview

TL;DR: Cyber threats have shifted over time to affect various cyber functionalities, such as with direct denial of service (DDoS), data theft, changes to data code, infection via computer virus, and many others.