


default search action
International Journal of Critical Infrastructure Protection, Volume 22
Volume 22, September 2018
- Martin Zimmermann, Martina Winker, Engelbert Schramm:
Vulnerability analysis of critical infrastructures in the case of a semi-centralised water reuse system in Qingdao, China. 4-15 - Ulas Baran Baloglu
, Yakup Demir:
Lightweight privacy-preserving data aggregation scheme for smart grid metering infrastructure protection. 16-24 - Hannes Seppänen, Pekka Luokkala, Zhe Zhang
, Paulus Torkki
, Kirsi Virrantaus:
Critical infrastructure vulnerability - A method for identifying the infrastructure service failure interdependencies. 25-38 - Yacine Rebahi, Kin Tsun Chiu, Nikolay Tcholtchev
, Simon Hohberg, Evangelos Pallis
, Evangelos K. Markakis:
Towards a next generation 112 testbed: The EMYNOS ESInet. 39-50 - Chi Yung Lam, Kang Tai
:
Modeling infrastructure interdependencies by integrating network and fuzzy set theory. 51-61 - Asem Ghaleb, Sami Zhioua
, Ahmad Almulhem
:
On PLC network security. 62-69 - Rafal Leszczyna:
Standards on cyber security assessment of smart grid. 70-89 - Xinchun Jie, Haikuan Wang, Minrui Fei, Dajun Du
, Qing Sun, Tai C. Yang:
Anomaly behavior detection and reliability assessment of control systems based on association rules. 90-99 - Chen Zhao, Nan Li
, DongPing Fang:
Criticality assessment of urban interdependent lifeline systems using a biased PageRank algorithm and a multilayer weighted directed network model. 100-112 - Abdullah Khalili, Ashkan Sami
, Amin Khozaei, Saber Pouresmaeeli:
SIDS: State-based intrusion detection for stage-based cyber physical systems. 113-124 - David Rehak
, Pavel Senovsky
, Martin Hromada
, Tomás Lovecek
, Petr Novotný
:
Cascading Impact Assessment in a Critical Infrastructure System. 125-138
- Meirong Guo:
China's cybersecurity legislation, it's relevance to critical infrastructures and the challenges it faces. 139-149
- Pramode K. Verma:
The natural impact of artificial intelligence. 150-151

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.