메뉴 건너뛰기




Volumn , Issue , 2013, Pages 153-172

Risk assessment of multi-order dependencies between critical information and communication infrastructures

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84898122057     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-4666-2964-6.ch008     Document Type: Chapter
Times cited : (5)

References (29)
  • 1
    • 28244488689 scopus 로고    scopus 로고
    • Causes of the 2003 major grid blackouts in North America and Europe, and recommended means to improve system dynamic performance
    • doi:10.1109/TPWRS.2005.857942
    • Andersson, G., Donalek, P., Farmer, R., Hatziargyriou, N., Kamwa, I., & Kundur, P. (2005). Causes of the 2003 major grid blackouts in North America and Europe, and recommended means to improve system dynamic performance. IEEE Transactions on Power Systems, 20(4), 1922-1928. doi:10.1109/TPWRS.2005.857942
    • (2005) IEEE Transactions On Power Systems , vol.20 , Issue.4 , pp. 1922-1928
    • Andersson, G.1    Donalek, P.2    Farmer, R.3    Hatziargyriou, N.4    Kamwa, I.5    Kundur, P.6
  • 3
    • 34848899205 scopus 로고    scopus 로고
    • Information security systems vs. critical information infrastructure protection systems - Similarities and differences
    • Bialas, A. (2006). Information security systems vs. critical information infrastructure protection systems - Similarities and differences. In Proceedings of the International Conference on Dependability of Computer Systems (pp. 60-67).
    • (2006) In Proceedings of the International Conference On Dependability of Computer Systems , pp. 60-67
    • Bialas, A.1
  • 4
    • 68949114516 scopus 로고    scopus 로고
    • Decentralized risk management for strategic preparedness of critical infrastructure through decomposition of the inoperability input-output model
    • doi:10.1016/j.ijcip.2008.08.009
    • Crowther, K. G. (2008). Decentralized risk management for strategic preparedness of critical infrastructure through decomposition of the inoperability input-output model. International Journal of Critical Infrastructure Protection, 1, 53-67. doi:10.1016/j.ijcip.2008.08.009
    • (2008) International Journal of Critical Infrastructure Protection , vol.1 , pp. 53-67
    • Crowther, K.G.1
  • 7
    • 79251485799 scopus 로고    scopus 로고
    • Council Directive 2008/114/EC of 8 December 2008 On the Identification and Designation of European Critical Infrastructures and the Assessment of The Need to Improve their Protection
    • European Council
    • European Council. (2008). Council Directive 2008/114/EC of 8 December 2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection. Official Journal L 345, 0075-0082.
    • (2008) Official Journal L 345 , pp. 0075-0082
  • 8
    • 36248970097 scopus 로고    scopus 로고
    • Risk analysis in dependent infrastructures
    • Goetz, E., & Sheno, S. (Eds.), Boston, MA: Springer. doi:10.1007/978-0-387-75462-8_21
    • Haimes, Y., Santos, J., Crowther, K., Henry, M., Lian, C., & Yan, Z. (2007). Risk analysis in dependent infrastructures. In Goetz, E., & Sheno, S. (Eds.), Critical infrastructure protection (Vol. 253, pp. 297-310). Boston, MA: Springer. doi:10.1007/978-0-387-75462-8_21
    • (2007) Critical Infrastructure Protection , vol.253 , pp. 297-310
    • Haimes, Y.1    Santos, J.2    Crowther, K.3    Henry, M.4    Lian, C.5    Yan, Z.6
  • 11
    • 49949089091 scopus 로고    scopus 로고
    • Critical infrastructures at risk: A need for a new conceptual approach and extended analytical tools
    • doi:10.1016/j.ress.2008.03.005
    • Kröger, W. (2008). Critical infrastructures at risk: A need for a new conceptual approach and extended analytical tools. Reliability Engineering & System Safety, 93(12), 1781-1787. doi:10.1016/j.ress.2008.03.005
    • (2008) Reliability Engineering & System Safety , vol.93 , Issue.12 , pp. 1781-1787
    • Kröger, W.1
  • 13
    • 64649085998 scopus 로고    scopus 로고
    • A methodological approach to analyze vulnerability of dependent infrastructures
    • doi:10.1016/j.simpat.2009.02.001
    • Min, O., Liu, H., Zi-Jun, M., Ming-Hui, Y., & Fei, Q. (2009). A methodological approach to analyze vulnerability of dependent infrastructures. Simulation Modelling Practice and Theory, 17, 817-828. doi:10.1016/j.simpat.2009.02.001
    • (2009) Simulation Modelling Practice and Theory , vol.17 , pp. 817-828
    • Min, O.1    Liu, H.2    Zi-Jun, M.3    Ming-Hui, Y.4    Fei, Q.5
  • 14
    • 84898193358 scopus 로고    scopus 로고
    • Managing risk from information systems - An organizational perspective
    • National Institute for Standards and Technology, USA
    • National Institute for Standards and Technology. (2008). Managing risk from information systems - An organizational perspective. NIST Special Publication 800-39, 2nd Public Draft, USA.
    • (2008) NIST Special Publication 800-39, 2nd Public Draft
  • 15
    • 55549098577 scopus 로고    scopus 로고
    • Modeling dependencies in critical infrastructures
    • E. Goetz & S. Sheno (Eds.), Springer Boston, USA
    • Nieuwenhuijs, A., Luiijf, E., & Klaver, M. (2008). Modeling dependencies in critical infrastructures. In E. Goetz & S. Sheno (Eds.), Critical infrastructure protection, Vol. 253 (pp. 205-214. Springer Boston, USA.
    • (2008) Critical Infrastructure Protection , vol.253 , pp. 205-214
    • Nieuwenhuijs, A.1    Luiijf, E.2    Klaver, M.3
  • 18
    • 12344298391 scopus 로고    scopus 로고
    • Modeling and simulating critical infrastructures and their interdependencies
    • IEEE, USA
    • Rinaldi, S. (2004). Modeling and simulating critical infrastructures and their interdependencies. In 37th Hawaii International Conference on System Sciences, Vol. 2. IEEE, USA.
    • (2004) 37th Hawaii International Conference On System Sciences , vol.2
    • Rinaldi, S.1
  • 19
    • 0035696915 scopus 로고    scopus 로고
    • Identifying, understanding and analyzing critical infrastructure dependencies
    • doi:10.1109/37.969131
    • Rinaldi, S., Peerenboom, J., & Kelly, T. (2001). Identifying, understanding and analyzing critical infrastructure dependencies. IEEE Control Systems Magazine, 21(6), 11-25. doi:10.1109/37.969131
    • (2001) IEEE Control Systems Magazine , vol.21 , Issue.6 , pp. 11-25
    • Rinaldi, S.1    Peerenboom, J.2    Kelly, T.3
  • 21
    • 8844234423 scopus 로고    scopus 로고
    • Modeling the demand reduction input-output inoperability due to terrorism of interconnected infrastructures
    • doi:10.1111/j.0272-4332.2004.00540.x
    • Santos, J., & Haimes, Y. (2004). Modeling the demand reduction input-output inoperability due to terrorism of interconnected infrastructures. Risk Analysis, 24(6), 1437-1451. doi:10.1111/j.0272-4332.2004.00540.x
    • (2004) Risk Analysis , vol.24 , Issue.6 , pp. 1437-1451
    • Santos, J.1    Haimes, Y.2
  • 22
    • 71649091879 scopus 로고    scopus 로고
    • Critical infrastructure dependency assessment using the input-output inoperability model
    • doi:10.1016/j.ijcip.2009.09.002
    • Setola, R., De Porcellinis, S., & Sforna, M. (2009). Critical infrastructure dependency assessment using the input-output inoperability model. International Journal of Critical Infrastructure Protection, 2(4), 170-178. doi:10.1016/j.ijcip.2009.09.002
    • (2009) International Journal of Critical Infrastructure Protection , vol.2 , Issue.4 , pp. 170-178
    • Setola, R.1    de Porcellinis, S.2    Sforna, M.3
  • 23
    • 84898372512 scopus 로고    scopus 로고
    • Connectivity models of dependency in mixed-type critical infrastructure networks
    • doi:10.1016/j.istr.2007.02.005
    • Svedsen, N., & Wolthunsen, S. (2007). Connectivity models of dependency in mixed-type critical infrastructure networks. Information Security Technical Report, 1, 44-55. doi:10.1016/j.istr.2007.02.005
    • (2007) Information Security Technical Report , vol.1 , pp. 44-55
    • Svedsen, N.1    Wolthunsen, S.2
  • 25
    • 77955429216 scopus 로고    scopus 로고
    • A multi-layer criticality assessment methodology based on dependencies
    • doi:10.1016/j.cose.2010.02.003
    • Theoharidou, M., Kotzanikolaou, P., & Gritzalis, D. (2010). A multi-layer criticality assessment methodology based on dependencies. Computers & Security, 29(6), 643-658. doi:10.1016/j.cose.2010.02.003
    • (2010) Computers & Security , vol.29 , Issue.6 , pp. 643-658
    • Theoharidou, M.1    Kotzanikolaou, P.2    Gritzalis, D.3
  • 28
    • 79959544406 scopus 로고    scopus 로고
    • The state and the threat of cascading failure across critical infrastructures: The implications of empirical evidence from media incident reports
    • doi:10.1111/j.1467-9299.2011.01926.x
    • Van Eeten, M., Nieuwenhuijs, A., Luiijf, E., Klaver, M., & Cruz, E. (2011). The state and the threat of cascading failure across critical infrastructures: The implications of empirical evidence from media incident reports. Public Administration, 89, 381-400. doi:10.1111/j.1467-9299.2011.01926.x
    • (2011) Public Administration , vol.89 , pp. 381-400
    • van Eeten, M.1    Nieuwenhuijs, A.2    Luiijf, E.3    Klaver, M.4    Cruz, E.5
  • 29
    • 79952192413 scopus 로고    scopus 로고
    • Modeling interdependent network systems for identifying cascade-safe operating margins
    • doi:10.1109/TR.2010.2104211
    • Zio, E., & Sansavini, G. (2011). Modeling interdependent network systems for identifying cascade-safe operating margins. Transactions on Reliability, 60(1), 94-101. doi:10.1109/TR.2010.2104211
    • (2011) Transactions On Reliability , vol.60 , Issue.1 , pp. 94-101
    • Zio, E.1    Sansavini, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.