default search action
International Journal of Critical Infrastructure Protection, Volume 7
Volume 7, Number 1, March 2014
- Sujeet Shenoi:
Editorial. 1-2
- Jill Rowland, Mason Rice, Sujeet Shenoi:
The anatomy of a cyber power. 3-11 - Polinpapilinho F. Katina, C. Ariel Pinto, Joseph M. Bradley, Patrick T. Hester:
Interdependency-induced risk with applications to healthcare. 12-26 - Necibe Tuncer, Trang T. Le:
Effect of air travel on the spread of an avian influenza pandemic to the United States. 27-47
- Kendal Smith:
Designing flexible curricula to enhance critical infrastructure security and resilience. 48-50
- Luigi Coppolino, Salvatore D'Antonio, Luigi Romano:
Exposing vulnerabilities in electric power grids: An experimental approach. 51-60 - Carl Schuett, Jonathan Butts, Stephen Dunlap:
An evaluation of modification attacks on programmable logic controllers. 61-68
Volume 7, Number 2, June 2014
- Sujeet Shenoi:
Editorial. 69-70
- Abhishek Narain Singh, M. P. Gupta, Amitabh Ojha:
Identifying critical infrastructure sectors and their dependencies: An Indian scenario. 71-85 - Ra'ed M. Jaradat, Charles B. Keating:
Fragility of oil as a critical infrastructure problem. 86-99 - Athol Yates:
A framework for studying mortality arising from critical infrastructure loss. 100-111
- Richard George:
Observations from a Cyber Tabletop. 112-113
- Roland Bodenheim, Jonathan Butts, Stephen Dunlap, Barry E. Mullins:
Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices. 114-123 - Jill Rowland, Mason Rice, Sujeet Shenoi:
Whither cyberpower? 124-137
Volume 7, Number 3, September 2014
- Sujeet Shenoi:
Editorial. 139-140
- Ryan Farley, Xinyuan Wang:
Exploiting VoIP softphone vulnerabilities to disable host computers: Attacks and mitigation. 141-154 - Annarita Giani, Russell Bent, Feng Pan:
Phasor measurement unit selection for unobservable electric power data integrity attack detection. 155-164
- Eric A. M. Luiijf:
Are we in love with cyber insecurity? 165-166
- Richard White, Terrance E. Boult, Edward Chow:
A computational asset vulnerability model for the strategic protection of the critical infrastructure. 167-177 - Rick Nunes-Vaz, Steven Lord:
Designing physical security for complex infrastructures. 178-192 - David Ward, Naouma Kourti, Alessandro Lazari, Piotr Cofta:
Trust building and the European Reference Network for Critical Infrastructure Protection community. 193-210
Volume 7, Number 4, December 2014
- Sujeet Shenoi:
Editorial. 211-212
- Marina Krotofil, Alvaro A. Cárdenas, Jason Larsen, Dieter Gollmann:
Vulnerabilities of cyber-physical systems to stale data - Determining the optimal time to launch attacks. 213-232 - Antonia Rana, Luigi Sportiello:
Implementation of security and privacy in ePassports and the extended access control infrastructure. 233-243
- Mark Hagerott:
Stuxnet and the vital role of critical infrastructure operators and engineers. 244-246
- Alessandro Armando, Alessio Merlo, Luca Verderame:
Security considerations related to the use of mobile devices in the operation of critical infrastructures. 247-256 - Kyle Siler-Evans, Alex Hanson, Cecily Sunday, Nathan Leonard, Michele Tumminello:
Analysis of pipeline accidents in the United States from 1968 to 2009. 257-269
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.