-
3
-
-
34848899205
-
Information security systems vs. critical information infrastructure protection systems - Similarities and differences
-
A. Bialas, Information security systems vs. critical information infrastructure protection systems - Similarities and differences, Proceedings of the International Conference on the Dependability of Computer Systems, pp. 60-67, 2006.
-
(2006)
Proceedings of the International Conference On the Dependability of Computer Systems
, pp. 60-67
-
-
Bialas, A.1
-
4
-
-
70350354914
-
-
ETH Zurich, Zurich, Switzerland
-
E. Brunner and M. Suter, International CIIP Handbook 2008/2009: An Inventory of 25 National and 7 International Critical Infrastructure Protection Policies, Center for Security Studies, ETH Zurich, Zurich, Switzerland, 2008.
-
(2008)
International CIIP Handbook 2008/2009: An Inventory of 25 National and 7 International Critical Infrastructure Protection Policies, Center For Security Studies
-
-
Brunner, E.1
Suter, M.2
-
5
-
-
55549113587
-
Metrics for quantifying interdependencies
-
M. Papa and S. Shenoi (Eds.), Springer, Boston, Massachusetts
-
E. Casalicchio and E. Galli, Metrics for quantifying interdependencies, in Critical Infrastructure Protection II, M. Papa and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 215-227, 2008.
-
(2008)
Critical Infrastructure Protection II
, pp. 215-227
-
-
Casalicchio, E.1
Galli, E.2
-
9
-
-
77954515070
-
-
Insight Consulting, Issue 5.1, Walton-on-Thames, United Kingdom
-
Insight Consulting, CRAMM User Guide, Issue 5.1, Walton-on-Thames, United Kingdom, 2005.
-
(2005)
CRAMM User Guide
-
-
-
10
-
-
0004217479
-
-
ISO/IEC Guide 73:2002: Risk Management - Vocabulary - Guidelines for Use in Standards, Geneva, Switzerland
-
International Organization for Standardization, ISO/IEC Guide 73:2002: Risk Management - Vocabulary - Guidelines for Use in Standards, Geneva, Switzerland, 2002.
-
(2002)
International Organization For Standardization
-
-
-
11
-
-
36248950191
-
Visualizing cascading failures in critical cyber infrastructures
-
E. Goetz and S. Shenoi (Eds.), Springer, Boston, Massachusetts
-
J. Kopylec, A. D'Amico and J. Goodall, Visualizing cascading failures in critical cyber infrastructures, in Critical Infrastructure Protection, E. Goetz and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 351-364, 2007.
-
(2007)
Critical Infrastructure Protection
, pp. 351-364
-
-
Kopylec, J.1
D'Amico, A.2
Goodall, J.3
-
12
-
-
84891749415
-
-
1.1, U.S. Critical Infrastructure Assurance Office, Washington, DC
-
KPMG Peat Marwick, Vulnerability Assessment Framework 1.1, U.S. Critical Infrastructure Assurance Office, Washington, DC, 1998.
-
(1998)
KPMG Peat Marwick, Vulnerability Assessment Framework
-
-
-
13
-
-
49949089091
-
Critical infrastructures at risk: A need for a new conceptual approach and extended analytical tools
-
W. Kroger, Critical infrastructures at risk: A need for a new conceptual approach and extended analytical tools, Reliability Engineering and System Safety, vol. 93(12), pp. 1781-1787, 2008.
-
(2008)
Reliability Engineering and System Safety
, vol.93
, Issue.12
, pp. 1781-1787
-
-
Kroger, W.1
-
14
-
-
0001859044
-
A technique for the measurement of attitudes
-
R. Likert, A technique for the measurement of attitudes, Archives of Psychology, vol. 140(22), pp. 1-55, 1932.
-
(1932)
Archives of Psychology
, vol.140
, Issue.22
, pp. 1-55
-
-
Likert, R.1
-
15
-
-
84891817707
-
-
Version 1.04, Deliverable D1.2, Technical Report VITA PASR-2004-004400, TNO Defence, Security and Safety, The Hague, The Netherlands
-
E. Luiijf, Threat Taxonomy for Critical Infrastructures and Critical Infrastructure Risk Aspects at the EU-Level, Version 1.04, Deliverable D1.2, Technical Report VITA PASR-2004-004400, TNO Defence, Security and Safety, The Hague, The Netherlands, 2006.
-
(2006)
Threat Taxonomy For Critical Infrastructures and Critical Infrastructure Risk Aspects At the EU-Level
-
-
Luiijf, E.1
-
18
-
-
84891768416
-
-
Document RL32561, Congressional Research Service, Library of Congress, Washington, DC
-
J. Moteff, Risk Management and Critical Infrastructure Protection: Assessing, Integrating and Managing Threats, Vulnerabilities and Consequences, CRS Report for Congress, Document RL32561, Congressional Research Service, Library of Congress, Washington, DC, 2005.
-
(2005)
Risk Management and Critical Infrastructure Protection: Assessing, Integrating and Managing Threats, Vulnerabilities and Consequences, CRS Report For Congress
-
-
Moteff, J.1
Management, R.2
-
19
-
-
55549098577
-
Modeling dependencies in critical infrastructures
-
M. Papa and S. Shenoi (Eds.), Springer, Boston, Massachusetts
-
A. Nieuwenhuijs, E. Luiijf and M. Klaver, Modeling dependencies in critical infrastructures, in Critical Infrastructure Protection II, M. Papa and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 205-213, 2008.
-
(2008)
Critical Infrastructure Protection II
, pp. 205-213
-
-
Nieuwenhuijs, A.1
Luiijf, E.2
Klaver, M.3
-
20
-
-
84857277161
-
-
Standard CIP-002-1, Cyber Security-Critical Asset Identification, Washington, DC
-
North American Electric Reliability Corporation, Standard CIP-002-1, Cyber Security-Critical Asset Identification, Washington, DC, 2006.
-
(2006)
North American Electric Reliability Corporation
-
-
-
21
-
-
36248934021
-
-
Technical Report INL/EXT-06-11464, Idaho National Laboratory, Idaho Falls, Idaho
-
P. Pederson, D. Dudenhoeffer, S. Hartley and M. Permann, Critical Infrastructure Interdependency Modeling: A Survey of U.S. and International Research, Technical Report INL/EXT-06-11464, Idaho National Laboratory, Idaho Falls, Idaho, 2006.
-
(2006)
Critical Infrastructure Interdependency Modeling: A Survey of U.S. and International Research
-
-
Pederson, P.1
Dudenhoeffer, D.2
Hartley, S.3
Permann, M.4
-
23
-
-
0035696915
-
Identifying, understanding and analyzing critical infrastructure interdependencies
-
S. Rinaldi, J. Peerenboom and T. Kelly, Identifying, understanding and analyzing critical infrastructure interdependencies, IEEE Control Systems, vol. 21(6), pp. 11-25, 2001.
-
(2001)
IEEE Control Systems
, vol.21
, Issue.6
, pp. 11-25
-
-
Rinaldi, S.1
Peerenboom, J.2
Kelly, T.3
-
24
-
-
55549140849
-
An integrated approach for simulating interdependencies
-
M. Papa and S. Shenoi, (Eds.), Springer, Boston, Massachusetts
-
R. Setola, S. Bologna, E. Casalicchio and V. Masucci, An integrated approach for simulating interdependencies, in Critical Infrastructure Protection II, M. Papa and S. Shenoi, (Eds.), Springer, Boston, Massachusetts, pp. 229-239, 2008.
-
(2008)
Critical Infrastructure Protection II
, pp. 229-239
-
-
Setola, R.1
Bologna, S.2
Casalicchio, E.3
Masucci, V.4
-
25
-
-
1842829828
-
-
Special Publication 800-30, National Institute of Standards and Technology, Gaithersburg, Maryland
-
G. Stoneburner, A. Goguen and A. Feringa, Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology, Special Publication 800-30, National Institute of Standards and Technology, Gaithersburg, Maryland, 2002.
-
(2002)
Risk Management Guide For Information Technology Systems: Recommendations of the National Institute of Standards and Technology
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
|