


default search action
International Journal of System of Systems Engineering, Volume 1
Volume 1, Numbers 1/2, 2008
- Andres Sousa-Poza
, Samuel F. Kovacic, Charles B. Keating:
System of systems engineering: an emerging multidiscipline. 1-17 - Victor 'Dirk' Bindi, John Strunk, Jeffery Baker, Roger Bacon, Matthew G. Boensel, Francis E. Shoup III, Ravi Vaidyanathan
:
Littoral undersea warfare: a case study in process modelling for functionality and interoperability of complex systems. 18-58 - Roland Rieke
:
Abstraction-based analysis of known and unknown vulnerabilities of critical information infrastructures. 59-77 - Paulo Veríssimo
, Nuno Ferreira Neves
, Miguel Correia
:
The CRUTIAL reference critical information infrastructure architecture: a blueprint. 78-95 - Shiqun Li, Shane Balfe, Jianying Zhou
, Kefei Chen:
Enforcing trust in pervasive computing. 96-110 - Jose M. Sarriegi, Jose J. Gonzalez:
Conceptualising social engineering attacks through system archetypes. 111-127 - Efthimia Aivaloglou
, Stefanos Gritzalis
, Charalabos Skianis:
Trust establishment in sensor networks: behaviour-based, certificate-based and a combinational approach. 128-148 - Urs E. Gattiker:
Early warning system for home users and small- and medium-sized enterprises: eight lessons learned. 149-170 - Ricardo Valerdi, Elliot Axelband, Thomas Baehren, Barry W. Boehm, Dave Dorenbos, Scott Jackson, Azad M. Madni, Gerald Nadler, Paul Robitaille, Stan Settles:
A research agenda for systems of systems architecting. 171-188 - Adrian V. Gheorghe, Dan V. Vamanu:
Mining intelligence data in the benefit of critical infrastructures security: vulnerability modelling, simulation and assessment, system of systems engineering. 189-221 - Yacov Y. Haimes:
Models for risk management of systems of systems. 222-236 - Fabrizio Baiardi
, Claudio Telmon:
Risk management of an information infrastructure: a framework based upon security dependencies. 237-256 - Sandro Bologna, Eric A. M. Luiijf
, Roberto Setola
:
R&D activities in Europe on critical information infrastructure protection. 257-270 - Osman Balci, William F. Ormsby:
Network-centric military system architecture assessment methodology. 271-292
Volume 1, Number 3, 2009
- Paul R. Garvey, C. Ariel Pinto:
An index to measure risk co-relationships in engineering enterprise systems. 293-313 - John A. Sokolowski, Catherine M. Banks:
A methodology to explore the impact of policy changes on insurgencies. 314-328 - Scott M. Meentemeyer, Brian J. Sauser, John T. Boardman:
Analysing a system of systems characterisation to define system of systems engineering practices. 329-346 - Alex Gorod, Michael J. DiMario, Brian J. Sauser, John T. Boardman:
'Satisficing' system of systems using dynamic and static doctrines. 347-366 - Silvano Chiaradonna, Felicita Di Giandomenico, Paolo Lollini
:
Assessing the impact of interdependencies in electric power systems. 367-386
Volume 1, Number 4, 2009
- João Paulo S. Medeiros, Agostinho M. Brito Jr., Paulo S. Motta Pires, Selan R. dos Santos:
Advances in network topology security visualisation. 387-400 - Salvatore D'Antonio, Luigi Romano, Abdelmajid Khelil
, Neeraj Suri
:
Increasing security and protection of SCADA systems through infrastructure resilience. 401-413 - Charles B. Keating, Ghaith Rabadi
, Rafael E. Landaeta, Shannon R. Bowling:
System of systems engineering for border security and immigration: methodologies, processes and tools. 414-444 - John A. Sokolowski, Catherine M. Banks:
Unequal protagonists: modelling the Irish insurgency 1916-1921. 445-471

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
