default search action
International Journal of Critical Infrastructure Protection, Volume 1
Volume 1, December 2008
- Sujeet Shenoi:
Editorial. 1-2 - Leon Strous, Kai Rannenberg:
Editorial. 3
- Richard George:
Critical infrastructure protection. 4-5
- Dan Assaf:
Models of critical information infrastructure protection. 6-14 - Mark Hartong, Rajni Goel, Duminda Wijesekera:
Security and the US rail infrastructure. 15-28 - Paul Vincent Craven, Paul W. Oman:
Modeling the NAJPTC network using NS-2. 29-36 - Peter Huitsing, Rodrigo Chandia, Mauricio Papa, Sujeet Shenoi:
Attack taxonomies for the Modbus protocols. 37-44 - Tyson Macaulay:
Assessing operational risk in the financial sector, using interdependency metrics. 45-52 - Kenneth G. Crowther:
Decentralized risk management for strategic preparedness of critical infrastructure through decomposition of the inoperability input-output model. 53-67 - Michael Spainhower, Jonathan Butts, Daniel Guernsey, Sujeet Shenoi:
Security analysis of RSVP-TE signaling in MPLS networks. 68-74 - Debin Liu, XiaoFeng Wang, L. Jean Camp:
Game-theoretic modeling and analysis of insider threats. 75-80 - Marianthi Theoharidou, Dimitra Xidara, Dimitris Gritzalis:
A CBK for Information Security and Critical Information and Communication Infrastructure Protection. 81-96
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.