default search action
International Journal of Critical Infrastructure Protection, Volume 2
Volume 2, Numbers 1-2, May 2009
- Sujeet Shenoi:
Editorial. 1-2
- Robert A. Miller:
There's infrastructure and ...critical infrastructure. 3-4
- Ettore Bompard, Roberto Napoli, Fei Xue:
Analysis of structural vulnerabilities in power transmission grids. 5-12 - Zahid Anwar, Mirko Montanari, Alejandro Gutierrez, Roy H. Campbell:
Budget constrained optimal security hardening of control networks for critical cyber-infrastructures. 13-25 - Martin Gilje Jaatun, Eirik Albrechtsen, Maria B. Line, Inger Anne Tøndel, Odd Helge Longva:
A framework for incident response management in the petroleum industry. 26-37 - Carlos E. Restrepo, Jeffrey S. Simonoff, Rae Zimmerman:
Causes, cost consequences, and risk implications of accidents in US hazardous liquid pipeline infrastructure. 38-50 - Monika Wieneke, Wolfgang Koch:
Combined person tracking and classification in a network of chemical sensors. 51-67
Volume 2, Number 3, October 2009
- Sujeet Shenoi:
Editorial. 69-70
- Pramode K. Verma:
George Orwell's Nineteen Eighty-Four - A retrospective and prospective twenty-five years later. 71-72
- Yu-Lun Huang, Alvaro A. Cárdenas, Saurabh Amin, Zong-Syun Lin, Hsin-Yi Tsai, Shankar Sastry:
Understanding the physical and economic consequences of attacks on control systems. 73-83 - Hamed Okhravi, David M. Nicol:
Application of trusted network technology to industrial control networks. 84-94 - Finn Olav Sveen, José Manuel Torres, Jose M. Sarriegi:
Blind information security strategy. 95-109 - Eliot H. Rich, Jose J. Gonzalez, Ying Qian, Finn Olav Sveen, Jaziar Radianti, Stefanie A. Hillen:
Emergent vulnerabilities in Integrated Operations: A proactive simulation study of economic risk. 110-123 - William J. Tolone:
Interactive visualizations for critical infrastructure analysis. 124-134
Volume 2, Number 4, December 2009
- Sujeet Shenoi:
Editorial. 135-136
- Robert A. Miller:
Standing in line for swine flu vaccine. 137-138
- Igor Nai Fovino, Andrea Carcano, Marcelo Masera, Alberto Trombetta:
An experimental investigation of malware attacks on SCADA systems. 139-145 - Denise Grayson, Daniel Guernsey, Jonathan Butts, Michael Spainhower, Sujeet Shenoi:
Analysis of security threats to MPLS virtual private networks. 146-153 - Anas Abou El Kalam, Yves Deswarte, Amine Baïna, Mohamed Kaâniche:
PolyOrBAC: A security framework for Critical Infrastructures. 154-169 - Roberto Setola, Stefano De Porcellinis, Marino Sforna:
Critical infrastructure dependency assessment using the input-output inoperability model. 170-178 - Myriam Dunn Cavelty, Manuel Suter:
Public-Private Partnerships are no silver bullet: An expanded governance model for Critical Infrastructure Protection. 179-187
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.