Critical infrastructures: a perspective from systems of systems
暂无分享,去创建一个
[1] Z. Lukszo,et al. Information security assurance in critical infrastructures: Smart metering case , 2008, 2008 First International Conference on Infrastructure Systems and Services: Building Networks for a Brighter Future (INFRA).
[2] Patrick T. Hester,et al. Interdependency-induced risk with applications to healthcare , 2014, Int. J. Crit. Infrastructure Prot..
[3] Tilman Wolf,et al. Securing the data path of next-generation router systems , 2011, Comput. Commun..
[4] Bertrand De Longueville,et al. Community-based geoportals: The next generation? Concepts and methods for the geospatial Web 2.0 , 2010, Comput. Environ. Urban Syst..
[5] Myriam Dunn Cavelty. Cyber-Security and Threat Politics: US Efforts to Secure the Information Age , 2007 .
[6] Adrian V. Gheorghe,et al. Critical Infrastructures at Risk: A European Perspective , 2010 .
[7] H.A.M. Luiijf,et al. European risk assessment methodology for critical infrastructures , 2008, 2008 First International Conference on Infrastructure Systems and Services: Building Networks for a Brighter Future (INFRA).
[8] Stephen Potter,et al. FireGrid: An e-infrastructure for next-generation emergency response support , 2010, J. Parallel Distributed Comput..
[9] Jock Given,et al. Take your partners: Public private interplay in Australian and New Zealand plans for next generation broadband , 2010 .
[10] Behnido Y. Calida,et al. Regional industries as critical infrastructures: a tale of two modern cities , 2012, Int. J. Crit. Infrastructures.
[11] Soon Ae Chun,et al. Building the next generation of digital government infrastructures , 2009, Gov. Inf. Q..
[12] Savvas Papagiannidis,et al. Well beyond streaming video: IPv6 and the next generation television , 2006 .
[13] Patrick T. Hester,et al. Examining metrics and methods for determining critical facility system effectiveness , 2010, Int. J. Crit. Infrastructures.
[14] Stafford Beer,et al. The Viable System Model : its provenance , development , methodology and pathology * Stafford Beer = President of the World Organization for Systems and Cybernetics , 2000 .
[15] Carl H. Hauser,et al. Security, trust, and QoS in next-generation control and communication for large power systems , 2008, Int. J. Crit. Infrastructures.
[16] Paulien M. Herder,et al. Critical infrastructures : state of the art in research and application , 2003 .
[17] Venceslav Kostadinov. Developing new methodology for nuclear power plants vulnerability assessment , 2011 .
[18] Andres Sousa-Poza,et al. System of systems engineering: an emerging multidiscipline , 2008, Int. J. Syst. Syst. Eng..
[19] Patrick T. Hester,et al. Systemic determination of infrastructure criticality , 2013, Int. J. Crit. Infrastructures.
[20] Charles Noble,et al. Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling , 2009 .
[21] V. Kandiah,et al. Identifying and Understanding the Infrastructure Interdependencies in Water Systems , 2008 .
[22] Milos Manic,et al. CIMS: A Framework for Infrastructure Interdependency Modeling and Analysis , 2006, Proceedings of the 2006 Winter Simulation Conference.
[23] Arjen Boin,et al. Critical Infrastructures under Threat: Learning from the Anthrax Scare , 2003 .
[24] Adrian V. Gheorghe,et al. Mining intelligence data in the benefit of critical infrastructures security: vulnerability modelling, simulation and assessment, system of systems engineering , 2008, Int. J. Syst. Syst. Eng..
[25] Charles B. Keating,et al. System requirements engineering in complex situations , 2012, Requirements Engineering.
[26] Barry M. Horowitz,et al. Modeling interdependent infrastructures for sustainable counterterrorism , 2004 .
[27] John D Moteff. Critical Infrastructures: Background, Policy, and Implementation , 2009 .
[28] Hafiz Abdur Rahman,et al. Quantitative estimates of critical infrastructures' interdependencies on the communication and information technology infrastructure , 2011, Int. J. Crit. Infrastructures.
[29] George E. Apostolakis,et al. A methodology for the prioritization of operating experience in nuclear power plants , 2001, Reliab. Eng. Syst. Saf..
[30] José Pérez Ríos. Design and Diagnosis for Sustainable Organizations: The Viable System Method , 2012 .
[31] G. Rabadi,et al. System of systems engineering , 2003, IEEE Engineering Management Review.
[32] T. Macaulay. Critical Infrastructure: Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies , 2008 .
[33] B. Clinton,et al. Executive Order 13010: Critical Infrastructure Protection , 1996 .
[34] João Vareda,et al. Can two-part tariffs promote efficient investment on next generation networks? , 2010 .
[35] James H Lambert,et al. A Risk‐Based Approach to Setting Priorities in Protecting Bridges Against Terrorist Attacks , 2004, Risk analysis : an official publication of the Society for Risk Analysis.
[36] Daniel DeLaurentis,et al. A System-of-Systems Perspective for Public Policy Decisions , 2004 .
[37] M.R. Permann. Toward Developing Genetic Algorithms to Aid in Critical Infrastructure Modeling , 2007, 2007 IEEE Conference on Technologies for Homeland Security.
[38] Charles B. Keating,et al. Prevalence of pathologies in systems of systems , 2012, Int. J. Syst. Syst. Eng..
[39] Ick-Chan Joo. Next Generation Infrastructure , 1996 .
[40] Albert Jones,et al. Toward modeling and simulation of critical national infrastructure interdependencies , 2005 .
[41] Ilker Akgun,et al. Fuzzy integrated vulnerability assessment model for critical facilities in combating the terrorism , 2010, Expert Syst. Appl..
[42] George E. Apostolakis,et al. Bulk power risk analysis: Ranking infrastructure elements according to their risk significance , 2008 .
[43] Henning Schulzrinne,et al. How secure is the next generation of IP-based emergency services architecture? , 2010, Int. J. Crit. Infrastructure Prot..
[44] Tuna Tugcu,et al. Analytical modeling of CAC in next generation wireless systems , 2006, Comput. Networks.
[45] Mikko T. Siponen,et al. Analysis of modern IS security development approaches: towards the next generation of social and adaptable ISS methods , 2005, Inf. Organ..
[46] Karen Katen. Best Practices for Government to Enhance the Security of National Critical Infrastructures - Final Report and Recommendations by the Council , 2004 .
[47] Mohammad Jamshidi,et al. System of systems engineering : innovations for the 21st century , 2008 .
[48] James K Hayes,et al. The Private Sector and the Role of Risk and Responsibility in Securing the Nation's Infrastructure , 2011 .
[49] James P. Peerenboom,et al. Identifying, understanding, and analyzing critical infrastructure interdependencies , 2001 .
[50] Ewart R. Carson,et al. Dealing with Complexity , 1988, Springer US.
[51] John D. Hoyt,et al. Critical Infrastructure Protection Decision Support System , 2004 .
[52] M. A. Fütterer,et al. Next generation fuel irradiation capability in the High Flux Reactor Petten , 2009 .
[53] Christopher Mackey,et al. Development of a prioritization methodology for maintaining Virginia's bridge infrastructure systems , 2009, 2009 Systems and Information Engineering Design Symposium.
[54] Steve Anderson,et al. Managing the interstitials, a System of Systems framework suited for the Ballistic Missile Defense System , 2011, Syst. Eng..
[55] P. Anderson. Critical Infrastructure Protection in the Information Age , 2003 .
[56] John Regalbuto,et al. An NSF perspective on next generation hydrocarbon biorefineries , 2010, Comput. Chem. Eng..
[57] Adrian V. Gheorghe,et al. Infranomics - Sustainability, Engineering Design and Governance , 2014 .
[58] Michael Chertoff. Department of Homeland Security. , 2007, Disaster medicine and public health preparedness.
[59] Roberto Setola,et al. Critical infrastructure dependency assessment using the input-output inoperability model , 2009, Int. J. Crit. Infrastructure Prot..
[60] J. Ottino. Foundations for Complex Systems Research in the Physical Sciences and Engineering Report from an , 2009 .
[61] Roland Rieke. Abstraction-based analysis of known and unknown vulnerabilities of critical information infrastructures , 2008, Int. J. Syst. Syst. Eng..
[62] Irene Eusgeld,et al. Comparative Evaluation of Modeling and Simulation Techniques for Interdependent Critical Infrastructures , 2008 .
[63] George E. Apostolakis,et al. Identification of critical locations across multiple infrastructures for terrorist actions , 2007, Reliab. Eng. Syst. Saf..
[64] James D. Myers,et al. Regional critical infrastructure assessment: Kansas City , 2011, Int. J. Crit. Infrastructures.
[65] Adrian V. Gheorghe. Critical Infrastructures at Risk: Securing the European Electric Power System , 2006 .
[66] John D. Moteff,et al. Critical Infrastructures: What Makes an Infrastructure Critical? , 2003 .
[67] Wolter J. Fabrycky,et al. Systems engineering and analysis , 1981 .
[68] Mark W. Maier,et al. Architecting Principles for Systems‐of‐Systems , 1996 .
[69] Enrico Zio,et al. The role of network theory and object-oriented modeling within a framework for the vulnerability analysis of critical infrastructures , 2009, Reliab. Eng. Syst. Saf..
[70] Mark de Bruijne. Next generation critical infrastructures: the push and pull to real-time , 2004, SMC.
[71] Yod Samuel Martín García,et al. A user-centric approach to service creation and delivery over next generation networks , 2011 .
[72] Charles B. Keating,et al. Systems of systems engineering: prospects and challenges for the emerging field , 2011, Int. J. Syst. Syst. Eng..
[73] Igor Linkov,et al. Managing critical infrastructure risks : decision tools and applications for port security , 2007 .