default search action
International Journal of Critical Infrastructures, Volume 13
Volume 13, Number 1, 2017
- Shahrzad Oveisi, Reza Ravanmehr:
Analysis of software safety and reliability methods in cyber physical systems. 1-15 - Christine Izuakor, Richard White:
Critical infrastructure asset identification: seemingly simple but frustratingly elusive. 16-28 - Peter Klein, Reinhard Hutter:
Qualitative criteria in the assessment of security measures for critical infrastructure protection - a new approach. 29-45 - Saravanan Kumarasamy:
Neuro-fuzzy-based clustering of DDoS attack detection in the network. 46-56 - Eilia Jafar, Udita Taneja:
Determinants of business continuity management in hospitals. 57-69 - Muhammad Ali Noor, Malik Khalfan:
Public private partnership in transport sector projects in Pakistan. 70-92
Volume 13, Numbers 2/3, 2017
- Nathan Wallace, Travis Atkison:
On the detection of cyber-events in the grid using PCA. 96-112 - Andy Wood, Ying He, Leandros A. Maglaras, Helge Janicke:
A security architectural pattern for risk management of industry control systems within critical national infrastructure. 113-132 - Trupil Limbasiya, Sachit Shivam:
A two-factor key verification system focused on remote user for medical applications. 133-151 - Tesleem Fagade, Konstantinos Maraslis, Theo Tryfonas:
Towards effective cybersecurity resource allocation: the Monte Carlo predictive modelling approach. 152-167 - Polinpapilinho F. Katina, Charles B. Keating, Adrian V. Gheorghe, Marcelo Masera:
Complex system governance for critical cyber-physical systems. 168-183 - George Stergiopoulos, Vasilis Kouktzoglou, Marianthi Theocharidou, Dimitris Gritzalis:
A process-based dependency risk analysis methodology for critical infrastructures. 184-205 - Estefanía Etchevés Miciolino, Dario Di Noto, Federico Griscioli, Maurizio Pizzonia, Jörg Kippe, Steffen Pfrang, Xavier Clotet, Gladys León, Fatai Babatunde Kassim, David Lund, Elisa Costante:
Preemptive: an integrated approach to intrusion detection and prevention in industrial control systems. 206-237 - Jingwei Huang, David M. Nicol:
An anatomy of trust in public key infrastructure. 238-258 - John S. Hurley:
Achieving desired performance objectives in the energy sector through data analytics. 259-277 - Cristina Alcaraz:
Resilient industrial control systems based on multiple redundancy. 278-295
Volume 13, Number 4, 2017
- Fatemeh Anvarifar, Matthijs Kok, Wil Thissen, Chris Zevenbergen, Defne Osmanoglou, Behrouz Raftari Tangabi:
Cost-effectiveness analysis of reinforcement strategies for (multifunctional) flood defences. 297-328 - Stefano Armenia, Georgios Tsaples, Camillo Carlini, Claudia Volpetti, Riccardo Onori, Gianluca Biondi:
A system dynamics simulation tool for the management of extreme events in urban transportation systems. 329-353 - Ali Marjanian, Soodabeh Soleymani:
Optimal investment in power system for defending against malicious attacks through defender-attacker-defender model and mixed strategy Nash equilibrium. 354-373
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.