메뉴 건너뛰기




Volumn , Issue , 2010, Pages 262-267

Risk-based methodology for real-time security monitoring of interdependent services in critical infrastructures

Author keywords

CI interdependency; Critical infrastructure; Monitoring; Risk management; Security

Indexed keywords

CASCADING EFFECTS; CRITICAL INFRASTRUCTURE; DIFFERENT SERVICES; DISTRIBUTED SYSTEMS; REAL-TIME SECURITY; RISK-BASED; SECURITY FAILURE; SECURITY PROPERTIES;

EID: 77952346686     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2010.102     Document Type: Conference Paper
Times cited : (16)

References (18)
  • 2
    • 0035696915 scopus 로고    scopus 로고
    • Identifying, understanding, and analyzing critical infrastructure interde-pendencies
    • S. M. Rinaldi, J. P. Peerenboom, and T. K. Kelly, "Identifying, understanding, and analyzing critical infrastructure interde-pendencies," IEEE Control Systems Magazine, vol. 21, pp. 11-25, 2001.
    • (2001) IEEE Control Systems Magazine , vol.21 , pp. 11-25
    • Rinaldi, S.M.1    Peerenboom, J.P.2    Kelly, T.K.3
  • 7
    • 38349013929 scopus 로고    scopus 로고
    • Modelling interdependencies between the electricity and information infrastructures
    • J. Laprie, K. Kanoun, and M. Kaaniche, "Modelling interdependencies between the electricity and information infrastructures," Lecture Notes in Computer Science, vol. 4680, p. 54, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4680 , pp. 54
    • Laprie, J.1    Kanoun, K.2    Kaaniche, M.3
  • 8
    • 50149106171 scopus 로고    scopus 로고
    • A conceptual modeling method for critical infrastructure modeling
    • IEEE Computer Society
    • J. Sokolowski, C. D. Turnitsa, and S Y. Diallo, "A conceptual modeling method for critical infrastructure modeling," n Annual Simulation Symposium. IEEE Computer Society, 2008, pp. 203-211.
    • (2008) Annual Simulation Symposium , pp. 203-211
    • Sokolowski, J.1    Turnitsa, C.D.2    Diallo, S.Y.3
  • 10
    • 34548706602 scopus 로고    scopus 로고
    • Toward developing genetic algorithms to aid in critical infrastructure modeling
    • May
    • M. Permann, "Toward developing genetic algorithms to aid in critical infrastructure modeling," in Technologies for Homeland Security 2007 IEEE Conference on, May 2007, pp. 192-197.
    • (2007) Technologies for Homeland Security 2007 IEEE Conference on , pp. 192-197
    • Permann, M.1
  • 11
    • 33750609845 scopus 로고    scopus 로고
    • Toward modeling and simulation of critical national infrastructure interdependencies
    • H Min, W. Beyeler, T. Brown, Y. Son, and A. Jones, "Toward modeling and simulation of critical national infrastructure interdependencies," IIE Transactions, vol. 39, no. 1, pp. 57-71, 2007.
    • (2007) IIE Transactions , vol.39 , Issue.1 , pp. 57-71
    • Min, H.1    Beyeler, W.2    Brown, T.3    Son, Y.4    Jones, A.5
  • 12
    • 34548083349 scopus 로고    scopus 로고
    • Graph models of critical infrastructure interdependencies
    • N Svendsen and S. Wolthusen, "Graph Models of Critical Infrastructure Interdependencies," Lecture Notes in Computer Science, vol 4543, p. 208, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4543 , pp. 208
    • Svendsen, N.1    Wolthusen, S.2
  • 13
    • 36248987804 scopus 로고    scopus 로고
    • Multigraph dependency models for heterogeneous infrastructures
    • N K. Svendsen and S. D. Wolthusen, "Multigraph dependency models for heterogeneous infrastructures" in Critical Infrastructure Potection, 2007, pp. 337-350.
    • (2007) Critical Infrastructure Potection , pp. 337-350
    • Svendsen, N.K.1    Wolthusen, S.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.