-
1
-
-
84883137949
-
-
PDD-63 - Defining America's Cyberspace: National Plan for Information Systems Protection, An Invitation to a Dialog, White House, Version 1.0
-
PDD-63 - Defining America's Cyberspace: National Plan for Information Systems Protection, Version 1.0, An Invitation to a Dialog, White House, 2000.
-
(2000)
-
-
-
3
-
-
84883167931
-
-
The National Strategy to Secure Cyberspace, February 2003, downloaded at, on 08 November
-
The National Strategy to Secure Cyberspace, February 2003, downloaded at http://www.dhs.gov/xlibrary/assets/National_Cyberspace_Strategy.pdf on 08 November, 2009.
-
(2009)
-
-
-
5
-
-
84883184326
-
-
Internet World Stats, accessed at, 10 November
-
Internet World Stats, accessed at http://www.internetworldstats.htm, 10 November, 2009.
-
(2009)
-
-
-
6
-
-
84883191910
-
-
http://www.w3.org/People/Berners-Lee/ShortHistory.html
-
-
-
-
8
-
-
70449347213
-
Mining intelligence data in the benefit of critical infrastructures security: Vulnerability modeling, simulation and assessment, system of systems engineering
-
Gheorghe, A.V. and Vamanu, D. (2008) 'Mining intelligence data in the benefit of critical infrastructures security: vulnerability modeling, simulation and assessment, system of systems engineering', Int. J. System of Systems Engineering, Vol. 1, Nos. 1/2, pp. 189-221.
-
(2008)
Int. J. System of Systems Engineering
, vol.1
, Issue.1-2
, pp. 189-221
-
-
Gheorghe, A.V.1
Vamanu, D.2
-
9
-
-
77952380200
-
-
August 28
-
Braghn, S., Fovino, I.N., and Trombetta, A., Advanced Trust Negotiation in Critical Infrastructures, August 28, 2008.
-
(2008)
Advanced Trust Negotiation In Critical Infrastructures
-
-
Braghn, S.1
Fovino, I.N.2
Trombetta, A.3
-
10
-
-
84883142351
-
-
Class Notes from ENMA 771, Module 1: Complex Interdependent Systems
-
Gheorghe, A.V., Class Notes from ENMA 771, Module 1: Complex Interdependent Systems, 2009.
-
(2009)
-
-
Gheorghe, A.V.1
-
11
-
-
84883142827
-
-
Cyber Security Bulletin SB09-278, Vulnerability Summary for the Week of September 28, Downloaded from, 09 Nov, 2009
-
Cyber Security Bulletin SB09-278, Vulnerability Summary for the Week of September 28, 2009, Downloaded from http://www.us-cert.gov/cas/bulletins/SB09-278.html 09 Nov, 2009.
-
(2009)
-
-
-
12
-
-
84883170328
-
-
Downloaded on 09 November
-
http://www.msisac.org, Downloaded on 09 November, 2009.
-
(2009)
-
-
-
13
-
-
84883142315
-
-
Overview by the US-CCU of the Cyber Campaign Against Georgia in August of
-
Overview by the US-CCU of the Cyber Campaign Against Georgia in August of 2008, www.registan.net/.../US-CCU-Georgia-Cyber-Campaign-Overview.pdf
-
(2008)
-
-
-
15
-
-
84883200562
-
-
United States General Accounting Office Chapter Report, 05/22/96, GAO/AIMD-96-84, Information Security: Computer Attacks at Department of Defense Pose Increasing Risks
-
United States General Accounting Office Chapter Report, 05/22/96, GAO/AIMD-96-84, Information Security: Computer Attacks at Department of Defense Pose Increasing Risks.
-
-
-
-
16
-
-
84883159575
-
-
Wikipedia online dictionary, Downloaded, 9/13
-
Wikipedia online dictionary, Downloaded, 9/13/2009.
-
(2009)
-
-
-
17
-
-
84883168034
-
-
Adapted from MIL STD 882D
-
Adapted from MIL STD 882D.
-
-
-
-
18
-
-
77952521018
-
-
Managing and Regulating Networked Industries for Sustainability and Resilience, Longstaff, P.H., April 22
-
Managing and Regulating Networked Industries for Sustainability and Resilience, Longstaff, P.H., April 22, 2008.
-
(2008)
-
-
-
21
-
-
84883151236
-
-
http://www.ncircle.com/index.php?s=solution_Web-Application-Vulnerability-Statistics
-
-
-
-
22
-
-
84883192863
-
-
http://www.sans.org/top-cyber-security-risks/
-
-
-
-
23
-
-
67349217470
-
Abstraction-Based Analysis of Known and Unknown Vulnerabilities of Critical Information Infrastructures
-
Rieke, R. (2008) Abstraction-Based Analysis of Known and Unknown Vulnerabilities of Critical Information Infrastructures, Int. J. System of Systems Engineering, Vol. 1, Nos. 1/2, pp. 59-77.
-
(2008)
Int. J. System of Systems Engineering
, vol.1
, Issue.1-2
, pp. 59-77
-
-
Rieke, R.1
-
24
-
-
34548115974
-
-
Springer
-
Gheorghe, A.V., Masera, M., Weijnen M., and De Vries, L., Critical Infrastructures at Risk, Springer, 2006, p20.
-
(2006)
Critical Infrastructures At Risk
, pp. 20
-
-
Gheorghe, A.V.1
Masera, M.2
Weijnen, M.3
de Vries, L.4
-
26
-
-
84883157584
-
-
Downloaded 11 November
-
http://www.nist.gov, Downloaded 11 November, 2009.
-
(2009)
-
-
-
27
-
-
84883183266
-
-
www.irgc.org
-
-
-
-
28
-
-
84883196248
-
-
Risk Governance: Trends and Challenges, Future Forum for Public Security, 15 Nov
-
Risk Governance: Trends and Challenges, Future Forum for Public Security, 15 Nov 2007.
-
(2007)
-
-
-
29
-
-
77952380200
-
-
Advanced Trust Negotiation in Critical Infrastructures, August 28
-
Advanced Trust Negotiation in Critical Infrastructures, Braghin, S., Fovino, I., Trombetta, A., August 28, 2008.
-
(2008)
-
-
Braghin, S.1
Fovino, I.2
Trombetta, A.3
-
30
-
-
84883200042
-
-
Implications of Cyber Vulnerabilities on the Resilience and Security of the Electric Grid, Subcommittee on emerging threats, cyber security, and science and Technology, May 21
-
Implications of Cyber Vulnerabilities on the Resilience and Security of the Electric Grid, Subcommittee on emerging threats, cyber security, and science and Technology, May 21, 2008.
-
(2008)
-
-
-
31
-
-
84883169861
-
-
Federal Plan for Cyber Security and Information Assurance Research and Development, National Science and Technology Council, April 2006, downloaded at, on 11 Nov
-
Federal Plan for Cyber Security and Information Assurance Research and Development, National Science and Technology Council, April 2006, downloaded at www.nitrd.gov/Pubs/csia/csia_federal_plan.pdf on 11 Nov, 2009.
-
(2009)
-
-
-
32
-
-
84883197158
-
-
National Science Foundation, Downloaded at, on 11 November
-
National Science Foundation, Downloaded at http://www.nsf.gov on 11 November, 2009.
-
(2009)
-
-
-
33
-
-
34548115974
-
-
Springer
-
Gheorghe, A.V., Masera, M., Weijnen M., and De Vries, L., Critical Infrastructures at Risk, Springer, 2006, p. 306.
-
Critical Infrastructures At Risk
, pp. 306
-
-
Gheorghe, A.V.1
Masera, M.2
Weijnen, M.3
de Vries, L.4
-
34
-
-
70349644372
-
-
Sousa-Poza, A., Kovacic, S., and Keating, C. (2008) "System of Systems Engineering", Vol. 1, Nos. 1/2, pp. 1-17.
-
(2008)
System of Systems Engineering
, vol.1
, Issue.1-2
, pp. 1-17
-
-
Sousa-Poza, A.1
Kovacic, S.2
Keating, C.3
|