


default search action
International Journal of Critical Infrastructure Protection, Volume 3
Volume 3, Number 1, May 2010
- Sujeet Shenoi:
Editorial. 1-2
- Neil Robinson:
Where policy and preferences diverge. 3-4
- Mason Rice, Jonathan Butts, Robert Miller, Sujeet Shenoi:
An analysis of the legality of government-mandated computer inoculations. 5-15 - Erik Jenelius
, Jonas Westin, Åke J. Holmgren:
Critical infrastructure protection under imperfect attacker perception. 16-26
- Carl J. Clavadetscher:
Building national resilience capabilities. 27-28
- Mark G. Stewart
:
Risk-informed decision support for assessing the costs and benefits of counter-terrorism protective measures for infrastructure. 29-40 - Hannes Tschofenig, Mayutan Arumaithurai
, Henning Schulzrinne, Bernard Aboba:
How secure is the next generation of IP-based emergency services architecture? 41-50
Volume 3, Number 2, July 2010
- Sujeet Shenoi:
Editorial. 51-52
- Fred Cohen:
What makes critical infrastructures Critical? 53-54
- Ludovic Piètre-Cambacédès, Claude Chaudet:
The SEMA referential framework: Avoiding ambiguities in the terms "security" and "safety". 55-66 - Matthew H. Henry, Ryan M. Layer, David R. Zaret:
Coupled Petri nets for computer network risk analysis. 67-75 - Gabriele Oliva
, Stefano Panzieri
, Roberto Setola
:
Agent-based input-output interdependency model. 76-82 - Kenneth G. Crowther:
Risk-informed assessment of regional preparedness: A case study of emergency potable water for hurricane response in Southeast Virginia. 83-98
Volume 3, Numbers 3-4, December 2010
- Sujeet Shenoi:
Editorial. 99-100
- Robert A. Miller:
Infrastructure war: Chaos without carnage? 101-102
- Tyler Moore
:
The economics of cybersecurity: Principles and policy options. 103-117 - Mason Rice, Jonathan Butts, Robert Miller, Sujeet Shenoi:
Applying public health strategies to the protection of cyberspace. 118-127 - Forrest Hare, Jonathan Goldstein:
The interdependent security problem in the defense industrial base: An agent-based model on a social network. 128-139 - Gianmarco Baldini, Igor Nai Fovino, Marcelo Masera, Marco Luise, Vincenzo Pellegrini, Enzo Bagagli, Giuseppe Rubino, Raffaele Malangone, Marcoccio Stefano, Fabio Senesi:
An early warning system for detecting GSM-R wireless interference in the high-speed railway infrastructure. 140-156 - Ravi Akella, Han Tang, Bruce M. McMillin
:
Analysis of information flow security in cyber-physical systems. 157-173 - Rasika Chakravarthy, Carl H. Hauser, David E. Bakken:
Long-lived authentication protocols for process control systems. 174-181

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.