Addressing complex problem situations in critical infrastructures using soft systemsanalysis : the CS-AWARE approach
暂无分享,去创建一个
Gerald Quirchmayr | Juha Röning | Thomas Schaberreiter | Chris Wills | J. Röning | G. Quirchmayr | T. Schaberreiter | Christopher C. Wills
[1] Peter Checkland,et al. Systems Thinking, Systems Practice , 1981 .
[2] Derek H.T. Walker,et al. Five case studies applying soft systems methodology to knowledge management , 2001 .
[3] J. Drexhage. Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the reduction of the impact of certain plastic products on the environment , 2002 .
[4] M. Laakso,et al. A case for protocol dependency , 2005, First IEEE International Workshop on Critical Infrastructure Protection (IWCIP'05).
[5] Juha Röning,et al. Graphingwiki - a Semantic Wiki extension for visualising and inferring protocol dependency , 2006, SemWiki.
[6] Juha Röning,et al. Software Vulnerability vs. Critical Infrastructure - a Case Study of Antivirus Software , 2009 .
[7] Juha Röning,et al. Socio-technical Security Assessment of a VoIP System , 2010, 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies.
[8] Djamel Khadraoui,et al. Risk Assessment in Critical Infrastructure Security Modelling Based on Dependency Analysis - (Short Paper) , 2011, CRITIS.
[9] Gerald Quirchmayr,et al. Open Source Intelligence in Disaster Management , 2012, 2012 European Intelligence and Security Informatics Conference.
[10] Luis C. Dias,et al. An Application of Soft Systems Methodology in the Evaluation of Policies and Incentive Actions to Promote Technological Innovations in the Electricity Sector , 2016 .