default search action
International Journal of Critical Infrastructures, Volume 4
Volume 4, Numbers 1/2, 2008
- Carl H. Hauser, David E. Bakken, Ioanna Dionysiou, K. Harald Gjermundrød, Venkata S. Irava, Joel Helkey, Anjan Bose:
Security, trust, and QoS in next-generation control and communication for large power systems. 3-16 - José R. Martí, Jorge A. Hollman, Carlos Ventura, Juri Jatskevich:
Dynamic recovery of critical infrastructures: real-time temporal coordination. 17-31 - Alberto Stefanini, Marcelo Masera:
The security of power systems and the role of information and communication technologies: lessons from the recent blackouts. 32-45 - Karsten Peters, Lubos Buzna, Dirk Helbing:
Modelling of cascading effects and efficient response to disaster spreading in complex networks. 46-62 - Vittorio Rosato, L. Issacharoff, F. Tiriticco, Sandro Meloni, Stefano De Porcellinis, Roberto Setola:
Modelling interdependent infrastructures using interacting dynamical models. 63-79 - Enrico Zio, Claudio M. Rocco Sanseverino:
Security assessment in complex networks exposed to terrorist hazard: a simulation approach. 80-95 - Tom Rigole, Koen Vanthournout, K. De Brabandere, Geert Deconinck:
Agents controlling the electric power infrastructure. 96-109 - Stefano De Porcellinis, Roberto Setola, Stefano Panzieri, Giovanni Ulivi:
Simulation of heterogeneous and interdependent critical infrastructures. 110-128 - Giovanna Dondossola, Judit Szanto, Marcelo Masera, Igor Nai Fovino:
Effects of intentional threats to power substation control systems. 129-143
- Adrian V. Gheorghe, Dan V. Vamanu:
Quantitative Vulnerability Assessment of Critical Infrastructures: watching for hidden faults. 144-152 - Fabien Pouget, Marc Dacier, Van-Hau Pham:
Understanding threats: a prerequisite to enhance survivability of computing systems. 153-171 - Enrico Zio, Giovanni Sansavini:
A systematic procedure for analysing network systems. 172-184 - Nicolas Vanderavero, Xavier Brouckaert, Olivier Bonaventure, Baudouin Le Charlier:
The HoneyTank: a scalable approach to collect malicious internet traffic. 185-205
- Ferenc Jordán:
Predicting target selection by terrorists: a network analysis of the 2005 London underground attacks. 206-214
Volume 4, Number 3, 2008
- Ali A. Ghorbani, Ebrahim Bagheri:
The state of the art in critical infrastructure protection: a framework for convergence. 215-244 - Jemal H. Abawajy:
Security and privacy threats to volunteer computing. 245-255 - Wen-Jun Zhang, Xiao Liu, Choon-Lee Chai, Ralph Deters, Dong Liu, Dmytro Dyachuk, Yiliu Tu, Zaheer Baber:
Social network analysis of the vulnerabilities of interdependent critical infrastructures. 256-273 - Yiliu Tu, Wen-Jun Zhang, Xiao Liu, Wei Li, Choon-Lee Chai, Ralph Deters:
A disaster response management system based on the control systems technology. 274-295 - Meili Chen, Al Geist, David E. Bernholdt, Kasidit Chanchio, Daniel L. Million:
The design and prototype of RUDA, a distributed grid accounting system. 296-307 - Hyunjoon Jung, Hyuck Han, Hyungsoo Jung, Heon Young Yeom:
Dynamic and fine-grained authentication and authorisation for grid computing. 308-318 - Stefano Zanero, Giuliano Casale:
GIVS: integrity validation for grid security. 319-333
Volume 4, Number 4, 2008
- Maria Kjaerland:
Profiling coordinated cyber incidents towards the critical infrastructure in Norway. 335-352 - Benoit Robert, Luciano Morabito:
The operational tools for managing physical interdependencies among critical infrastructures. 353-367 - Dan V. Vamanu, Adrian V. Gheorghe, Valentin T. Acasandrei, Bogdan I. Vamanu:
Critical issues with 'minor league' nuclear infrastructures: the back end of the life cycle. 368-391 - Benoit Robert, Renaud De Calan, Luciano Morabito:
Modelling interdependencies among critical infrastructures. 392-408 - H. A. M. (Eric) Luiijf, Albert Nieuwenhuijs:
Extensible threat taxonomy for critical infrastructures. 409-417
- Jos L. M. Vrancken, Jan van den Berg, Michel dos Santos Soares:
Human factors in system reliability: lessons learnt from the Maeslant storm surge barrier in The Netherlands. 418-429 - Adrian V. Gheorghe, Dan V. Vamanu:
Forest fire essentials: a cellular automaton-wise, percolation-oriented model. 430-444 - Mike McGinnis, Wayne Buck:
NATO and Old Dominion University co-host disaster and incident management symposium. 445-454
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.