


default search action
International Journal of Critical Infrastructures, Volume 4
Volume 4, Numbers 1/2, 2008
- Carl H. Hauser, David E. Bakken, Ioanna Dionysiou

, K. Harald Gjermundrød
, Venkata S. Irava, Joel Helkey, Anjan Bose:
Security, trust, and QoS in next-generation control and communication for large power systems. 3-16 - José R. Martí, Jorge A. Hollman, Carlos Ventura, Juri Jatskevich:

Dynamic recovery of critical infrastructures: real-time temporal coordination. 17-31 - Alberto Stefanini, Marcelo Masera:

The security of power systems and the role of information and communication technologies: lessons from the recent blackouts. 32-45 - Karsten Peters, Lubos Buzna

, Dirk Helbing
:
Modelling of cascading effects and efficient response to disaster spreading in complex networks. 46-62 - Vittorio Rosato

, L. Issacharoff, F. Tiriticco, Sandro Meloni
, Stefano De Porcellinis, Roberto Setola
:
Modelling interdependent infrastructures using interacting dynamical models. 63-79 - Enrico Zio

, Claudio M. Rocco Sanseverino:
Security assessment in complex networks exposed to terrorist hazard: a simulation approach. 80-95 - Tom Rigole, Koen Vanthournout, K. De Brabandere, Geert Deconinck

:
Agents controlling the electric power infrastructure. 96-109 - Stefano De Porcellinis, Roberto Setola

, Stefano Panzieri
, Giovanni Ulivi:
Simulation of heterogeneous and interdependent critical infrastructures. 110-128 - Giovanna Dondossola

, Judit Szanto, Marcelo Masera, Igor Nai Fovino:
Effects of intentional threats to power substation control systems. 129-143
- Adrian V. Gheorghe, Dan V. Vamanu:

Quantitative Vulnerability Assessment of Critical Infrastructures: watching for hidden faults. 144-152 - Fabien Pouget, Marc Dacier

, Van-Hau Pham:
Understanding threats: a prerequisite to enhance survivability of computing systems. 153-171 - Enrico Zio

, Giovanni Sansavini
:
A systematic procedure for analysing network systems. 172-184 - Nicolas Vanderavero, Xavier Brouckaert, Olivier Bonaventure, Baudouin Le Charlier:

The HoneyTank: a scalable approach to collect malicious internet traffic. 185-205
- Ferenc Jordán:

Predicting target selection by terrorists: a network analysis of the 2005 London underground attacks. 206-214
Volume 4, Number 3, 2008
- Ali A. Ghorbani, Ebrahim Bagheri

:
The state of the art in critical infrastructure protection: a framework for convergence. 215-244 - Jemal H. Abawajy:

Security and privacy threats to volunteer computing. 245-255 - Wen-Jun Zhang

, Xiao Liu, Choon-Lee Chai, Ralph Deters
, Dong Liu, Dmytro Dyachuk, Yiliu Tu, Zaheer Baber:
Social network analysis of the vulnerabilities of interdependent critical infrastructures. 256-273 - Yiliu Tu, Wen-Jun Zhang

, Xiao Liu, Wei Li, Choon-Lee Chai, Ralph Deters
:
A disaster response management system based on the control systems technology. 274-295 - Meili Chen, Al Geist, David E. Bernholdt

, Kasidit Chanchio, Daniel L. Million:
The design and prototype of RUDA, a distributed grid accounting system. 296-307 - Hyunjoon Jung, Hyuck Han, Hyungsoo Jung, Heon Young Yeom:

Dynamic and fine-grained authentication and authorisation for grid computing. 308-318 - Stefano Zanero

, Giuliano Casale
:
GIVS: integrity validation for grid security. 319-333
Volume 4, Number 4, 2008
- Maria Kjaerland:

Profiling coordinated cyber incidents towards the critical infrastructure in Norway. 335-352 - Benoit Robert, Luciano Morabito:

The operational tools for managing physical interdependencies among critical infrastructures. 353-367 - Dan V. Vamanu, Adrian V. Gheorghe, Valentin T. Acasandrei, Bogdan I. Vamanu

:
Critical issues with 'minor league' nuclear infrastructures: the back end of the life cycle. 368-391 - Benoit Robert, Renaud De Calan, Luciano Morabito:

Modelling interdependencies among critical infrastructures. 392-408 - H. A. M. (Eric) Luiijf

, Albert Nieuwenhuijs:
Extensible threat taxonomy for critical infrastructures. 409-417
- Jos L. M. Vrancken, Jan van den Berg, Michel dos Santos Soares:

Human factors in system reliability: lessons learnt from the Maeslant storm surge barrier in The Netherlands. 418-429 - Adrian V. Gheorghe, Dan V. Vamanu:

Forest fire essentials: a cellular automaton-wise, percolation-oriented model. 430-444 - Mike McGinnis, Wayne Buck:

NATO and Old Dominion University co-host disaster and incident management symposium. 445-454

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














