


default search action
International Journal of Critical Infrastructures, Volume 2
Volume 2, Number 1, 2006
- Seung-Hoon Yoo:
Seaport infrastructure investment and economic growth in Korea. 1-9 - John T. Michalski:
Network security mechanisms utilising network address translation. 10-49 - Ana M. Quelhas, Esteban Gil
, James D. McCalley:
Nodal prices in an integrated energy system. 50-69 - Adrian V. Gheorghe, Dan V. Vamanu:
Risks in business design for critical infrastructures: the 'DASHBOARD' concept. 70-82 - Dan E. C. Gheorghe:
Polyphase FIR filters and Fant's re-sampling algorithm for securing information in critical information infrastructures: a new approach. 83-95 - Richard Narich:
Conference Report. Forum on Homeland Security, the USA, Europe, and the rest of the world: new challenges for institutions and the private sector. 96-112
Volume 2, Numbers 2/3, 2006
- Paulien M. Herder
, Zofia Verwater-Lukszo:
Towards next generation infrastructures: an introduction to the contributions in this issue. 113-120 - Margot P. C. Weijnen, Ivo Bouwmans:
Innovation in networked infrastructures: coping with complexity. 121-132 - Maarten Ottens, Maarten Franssen, Peter Kroes, Ibo van de Poel
:
Modelling infrastructures as socio-technical systems. 133-145 - R. John Hansman, Christopher L. Magee, Richard de Neufville, Renee Robins, Daniel Roos:
Research agenda for an integrated approach to infrastructure planning, design and management. 146-159 - E. F. Ten Heuvelhof:
New dilemmas in regulating critical infrastructures. 160-170 - Arjen Zoeteman:
Asset maintenance management: state of the art in the European railways. 171-186 - S. van Herk
, Paulien M. Herder
, W. M. De Jong, D. S. M. Alma:
Innovative contracting in infrastructure design and maintenance. 187-200 - Eric A. M. Luiijf
, Marieke H. A. Klaver:
Protection of the Dutch critical infrastructures. 201-214 - Rae Zimmerman, Carlos E. Restrepo:
The next step: quantifying infrastructure interdependencies to improve security. 215-230 - Mark de Bruijne, Michel van Eeten
, Emery Roe, Paul Schulman:
Assuring high reliability of service provision in critical infrastructures. 231-246 - Semir Daskapan, Willem G. Vree, René W. Wagenaar:
Emergent information security in critical infrastructures. 247-260 - Koen H. van Dam, Zofia Verwater-Lukszo, Jaap A. Ottjes, Gabriël Lodewijks
:
Distributed intelligence in autonomous multi-vehicle systems. 261-272 - Wolfgang Kröger:
Critical infrastructures at risk: securing electric power supply. 273-293 - Nathan Bowden, Martin De Jong:
Privatisation of seaport infrastructures: a framework for understanding the transfer of property rights. 294-317
Volume 2, Number 4, 2006
- Sandeep Butapati, Rakesh Kalidindi, Matthew Benke, Ahmed Abdel-Rahim, Paul W. Oman, Brian Johnson:
A case study of critical point identification in the physical and communication layers of a small urban transportation system. 319-330 - Michael Stoica, Bill Roach:
Sustainable development in the rural US Midwest: the m-commerce solution. The wireless critical infrastructure. 331-346 - Adrian V. Gheorghe, Dan V. Vamanu:
Another tool in the business of spatial framing of illicit/lost from account radioactive material: helping the AT (Anti-Terrorism) paraphernalia thrive. 347-356 - Michel van Eeten
, Hans de Bruijn, Mirjam Kars, Haiko Van Der Voort, Jaap Van Till:
The governance of cybersecurity: a framework for policy. 357-378 - Maurizio Sajeva, Marcelo Masera:
A strategic approach to risk governance of critical infrastructures. 379-395 - John Bigham, David Gamez, Xuan Jin, Chris I. Phillips:
Test data for anomaly detection in the electricity infrastructure. 396-411 - Kai Hwang, Min Cai, Yu-Kwong Kwok, Shanshan Song, Yu Chen, Ying Chen:
DHT-based security infrastructure for trusted internet and grid computing. 412-433

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.