


default search action
International Journal of Critical Infrastructure Protection, Volume 10
Volume 10, September 2015
- Sujeet Shenoi:
Editorial. 1-2
- Béla Genge, István Kiss, Piroska Haller
:
A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures. 3-17 - Cen Nan, Giovanni Sansavini
:
Multilayer hybrid modeling framework for the performance assessment of interdependent critical infrastructures. 18-33 - George Stergiopoulos
, Panayiotis Kotzanikolaou
, Marianthi Theocharidou
, Dimitris Gritzalis:
Risk mitigation strategies for critical infrastructures based on graph centrality analysis. 34-44
- Daniel J. Ryan:
Regulating the safety and security of the critical information commons. 45-46
- Michael Winn, Mason Rice, Stephen Dunlap, Juan Lopez Jr., Barry E. Mullins:
Constructing cost-effective and targetable industrial control system honeypots for production networks. 47-58 - Noam Erez, Avishai Wool
:
Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA systems. 59-70

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.