Skip to main content
Critical Infrastructures, such as energy, banking, and transport, are an essential pillar to the well-being of the national and international economy, security and quality of life. These infrastructures are dependent on a spectrum of... more
Deregulation, cyber-terrorism, and increased interdependency are making large complex critical infrastructures, such as the telecommunications and electricity networks, increasingly vulnerable. Solutions are needed that can provide a... more
Failure in Communication and Information Technology Infrastructure (CITI) can disrupt the effective functionalities of many of the critical infrastructures. Conversely, failures in other infrastructures can also propagate to CITI and... more
This article argues that contemporary street art (or graffiti) uses a unique set of resistant techniques to foreground the contours and shapes of different kinds of structural violence inscribed into, and perpetuated by, the... more
National security planners have begun to look beyond reactive, tactical cyber defense to proactive, strategic cyber defense, which may include international military deterrence. The incredible power of nuclear weapons gave birth to... more
Volcanic eruptions can produce a wide range of hazards. Although phenomena such as pyroclastic flows and surges, sector collapses, lahars and ballistic blocks are the most destructive and dangerous, volcanic ash is by far the most widely... more
Social and economic consequences of a terrorist attack on a vulnerable site can magnify impacts by indirectly damaging nearby critical infrastructure systems. This work extended research conducted in Years 4 and 5 on the implications of... more
Next generation systems for critical infrastructure protection must support capabilities such as behavior analysis, situation modeling and data mining integrated within sophisticated virtual or augmented reality interfaces. This paper... more
A power grid is a critical infrastructure that relies on supervisory control and data acquisition (SCADA) systems for monitoring, control, and operation. On top of the power infrastructure reside layers of information and communications... more
The objective of Bagre Growth Pole project is to support Burkina Faso Government by developing Bagre as a functional growth point under agro-business impulse. Bagre Growth Pole is a project which targets agricultural and pasture... more
In 2005, the University of Southern California's Institute for Critical Information Infrastructure Protection (ICIIP) developed a conceptual framework for enterprise security. ICIIP seeks to close the gap between the current corporate... more
When a SCADA (Supervisory Control and Data Acquisition) system monitors and manages other complex infrastructures through the use of distributed technologies, it becomes a critical infrastructure by itself: A failure or disruption in any... more
The growing dependence of critical infrastructures and industrial automation on interconnected physical and cyber based control systems has resulted in a growing and previously unforeseen cyber security threat to SCADA and DCS systems.... more