메뉴 건너뛰기




Volumn 5508 LNCS, Issue , 2009, Pages 258-270

Emerging information infrastructures: Cooperation in disasters

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION INFRASTRUCTURE; COMMUNICATION NETWORKS; CRITICAL INFRASTRUCTURE; DEVASTATING EFFECTS; HUMAN LIVES; INFORMATION INFRASTRUCTURES; RESCUE OPERATIONS; RESEARCH DIRECTIONS;

EID: 70349312705     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03552-4_23     Document Type: Conference Paper
Times cited : (27)

References (51)
  • 2
    • 0035120939 scopus 로고    scopus 로고
    • Toward self-healing energy infrastructure systems
    • Amin, M.: Toward self-healing energy infrastructure systems. IEEE Comput. Appl. Power 14(1), 20-28 (2001)
    • (2001) IEEE Comput. Appl. Power , vol.14 , Issue.1 , pp. 20-28
    • Amin, M.1
  • 5
    • 70349346349 scopus 로고    scopus 로고
    • The opportunities and limits of technology in non profit disaster response
    • Keynote speech at the, Washington May
    • Becker, J.C.: The opportunities and limits of technology in non profit disaster response. Keynote speech at the ISCRAM conference, Washington (May 2008)
    • (2008) ISCRAM conference
    • Becker, J.C.1
  • 6
    • 70349351278 scopus 로고    scopus 로고
    • Bengtsson, A., Westerdahl, L.: Access control in a coalition system. Technical Report FOIR- 2393-SE, Swedish Defence Research Agency (December 2007)
    • Bengtsson, A., Westerdahl, L.: Access control in a coalition system. Technical Report FOIR- 2393-SE, Swedish Defence Research Agency (December 2007)
  • 8
    • 21244452845 scopus 로고    scopus 로고
    • Overcoming communications challenges in software for monitoring and controlling power systems
    • Birman, K., Chen, J., Hopkinson, E., Thomas, R., Thorp, J., Van Renesse, R., Vogels, W.: Overcoming communications challenges in software for monitoring and controlling power systems. Proc. IEEE 93(5), 1028-1041 (2005)
    • (2005) Proc. IEEE , vol.93 , Issue.5 , pp. 1028-1041
    • Birman, K.1    Chen, J.2    Hopkinson, E.3    Thomas, R.4    Thorp, J.5    Van Renesse, R.6    Vogels, W.7
  • 10
    • 24744432675 scopus 로고    scopus 로고
    • Self-policing mobile ad hoc networks by reputation systems.IEEE
    • Buchegger, S., Le Boudec, J.: Self-policing mobile ad hoc networks by reputation systems.IEEE Communications Magazine 43(7), 101-107 (2005)
    • (2005) Communications Magazine , vol.43 , Issue.7 , pp. 101-107
    • Buchegger, S.1    Le Boudec, J.2
  • 12
    • 70349346347 scopus 로고    scopus 로고
    • CRUTIAL
    • CRUTIAL. European FP6 project, http://crutial.cesiricerca.it/
    • European FP6 project
  • 13
    • 33745188428 scopus 로고    scopus 로고
    • Hastily formed networks
    • Denning, P.J.: Hastily formed networks. Commun. ACM 49(4), 15-20 (2006)
    • (2006) Commun. ACM , vol.49 , Issue.4 , pp. 15-20
    • Denning, P.J.1
  • 14
  • 20
    • 40549104107 scopus 로고    scopus 로고
    • The state of the art in critical infrastructure protection: A framework for convergence
    • Ghorbani, A.A., Bagheri, E.: The state of the art in critical infrastructure protection: a framework for convergence. International Journal of Critical Infrastructures 4, 215-244 (2008)
    • (2008) International Journal of Critical Infrastructures , vol.4 , pp. 215-244
    • Ghorbani, A.A.1    Bagheri, E.2
  • 24
  • 26
    • 33745467053 scopus 로고    scopus 로고
    • Using the internet to communicate during a crisis
    • Jefferson, T.L.: Using the internet to communicate during a crisis. VINE 36, 139-142 (2006)
    • (2006) VINE , vol.36 , pp. 139-142
    • Jefferson, T.L.1
  • 27
    • 39449090815 scopus 로고    scopus 로고
    • A nature-inspired decentralized trust model to reduce information unreliability in complex disaster relief operations
    • Kostoulas, D., Aldunate, R., Pena-Mora, F., Lakhera, S.: A nature-inspired decentralized trust model to reduce information unreliability in complex disaster relief operations. Advanced Engineering Informatics 22(1), 45-58 (2008)
    • (2008) Advanced Engineering Informatics , vol.22 , Issue.1 , pp. 45-58
    • Kostoulas, D.1    Aldunate, R.2    Pena-Mora, F.3    Lakhera, S.4
  • 28
    • 85066851244 scopus 로고    scopus 로고
    • Krügel, C., Robertson, W.K.: Alert verification: Determining the success of intrusion attempts. In:Workshop the Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA). German Informatics Society (2004)
    • Krügel, C., Robertson, W.K.: Alert verification: Determining the success of intrusion attempts. In:Workshop the Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA). German Informatics Society (2004)
  • 30
    • 0032597647 scopus 로고    scopus 로고
    • Labovitz, C., Ahuja, A., Jahanian, F.: Experimental study of internet stability and backbone failures. In: Twenty-Ninth Annual International Symposium on Digest of Papers Fault-Tolerant Computing (1999)
    • Labovitz, C., Ahuja, A., Jahanian, F.: Experimental study of internet stability and backbone failures. In: Twenty-Ninth Annual International Symposium on Digest of Papers Fault-Tolerant Computing (1999)
  • 32
    • 38349013929 scopus 로고    scopus 로고
    • Modeling interdependencies between the electricity and information infrastructures
    • Saglietti, F, Oster, N, eds, SAFECOMP 2007, Springer, Heidelberg
    • Laprie, J., Kanoun, K., Kaniche, M.: Modeling interdependencies between the electricity and information infrastructures. In: Saglietti, F., Oster, N. (eds.) SAFECOMP 2007. LNCS, vol. 4680, pp. 54-67. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4680 , pp. 54-67
    • Laprie, J.1    Kanoun, K.2    Kaniche, M.3
  • 33
    • 0034270431 scopus 로고    scopus 로고
    • Defending yourself: The role of intrusion detection systems
    • McHugh, J., Christie, A., Allen, J.: Defending yourself: the role of intrusion detection systems. IEEE Softw. 17(5), 42-51 (2000)
    • (2000) IEEE Softw , vol.17 , Issue.5 , pp. 42-51
    • McHugh, J.1    Christie, A.2    Allen, J.3
  • 35
    • 0036998995 scopus 로고    scopus 로고
    • Jtrs and the evolution toward software-defined radio
    • October, 2002
    • Melby, J.: Jtrs and the evolution toward software-defined radio. In: MILCOM 2002, October 2002, pp. 1286-1290 (2002)
    • (2002) MILCOM 2002 , pp. 1286-1290
    • Melby, J.1
  • 40
    • 0035696915 scopus 로고    scopus 로고
    • Identifying, understanding, and analyzing critical infrastructure interdependencies
    • Rinaldi, S., Peerenboom, J., Kelly, T.: Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Syst. Mag. 21(6), 11-25 (2001)
    • (2001) IEEE Control Syst. Mag , vol.21 , Issue.6 , pp. 11-25
    • Rinaldi, S.1    Peerenboom, J.2    Kelly, T.3
  • 41
    • 24344439365 scopus 로고    scopus 로고
    • Optimistic replication
    • Saito, Y., Shapiro, M.: Optimistic replication. ACM Comput. Surv. 37(1), 42-81 (2005)
    • (2005) ACM Comput. Surv , vol.37 , Issue.1 , pp. 42-81
    • Saito, Y.1    Shapiro, M.2
  • 43
    • 84905576039 scopus 로고    scopus 로고
    • Shank, N., Sokol, B., Hayes, M., Vetrano, C.: Human services data standards: Current progress and future visions in crisis response. In: Proc. ISCRAM conference (May 2008)
    • Shank, N., Sokol, B., Hayes, M., Vetrano, C.: Human services data standards: Current progress and future visions in crisis response. In: Proc. ISCRAM conference (May 2008)
  • 44
    • 0242527321 scopus 로고    scopus 로고
    • The shared wireless infostation model: A new ad hoc networking paradigm (or where there is a whale, there is a way)
    • MobiHoc, ACM, New York
    • Small, T., Haas, Z.J.: The shared wireless infostation model: a new ad hoc networking paradigm (or where there is a whale, there is a way). In: Proc. International Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc). ACM, New York (2003)
    • (2003) Proc. International Symposium on Mobile Ad Hoc Networking & Computing
    • Small, T.1    Haas, Z.J.2
  • 48
    • 70349341748 scopus 로고    scopus 로고
    • Guide for developing security plans for federal information systems
    • Technical Report 800-18, National Institute of Standards and Technology February
    • Swanson, M., Hash, J., Bowen, P.: Guide for developing security plans for federal information systems. Technical Report 800-18, National Institute of Standards and Technology (February 2006)
    • (2006)
    • Swanson, M.1    Hash, J.2    Bowen, P.3
  • 49
    • 33749073702 scopus 로고    scopus 로고
    • Middleware support for fault tolerance
    • Mahmoud, Q, ed, John Wiley & Sons, Chichester
    • Szentivanyi, D., Nadjm-Tehrani, S.: Middleware support for fault tolerance. In: Mahmoud, Q. (ed.) Middleware for Communications. John Wiley & Sons, Chichester (2004)
    • (2004) Middleware for Communications
    • Szentivanyi, D.1    Nadjm-Tehrani, S.2
  • 51


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.