default search action
International Journal of Critical Infrastructure Protection, Volume 11
Volume 11, December 2015
- Sujeet Shenoi:
Editorial. 1-2
- Daniel G. Arce:
WikiLeaks and the risks to critical foreign dependencies. 3-11 - Carol J. Romanowski, Rajendra K. Raj, Jennifer Schneider, Sumita Mishra, Vinay Shivshankar, Srikant Ayengar, Fernando Cueva:
Regional response to large-scale emergency events: Building on historical data. 12-21
- Richard George:
Why we should worry about the supply chain. 22-23
- Béla Genge, Flavius Graur, Piroska Haller:
Experimental assessment of network design approaches for protecting industrial control systems. 24-38 - Adam Hahn, Roshan K. Thomas, Ivan Lozano, Alvaro A. Cárdenas:
A multi-layered and kill-chain based security analysis framework for cyber-physical systems. 39-50 - Hoda Jannati:
Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems. 51-61
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.