메뉴 건너뛰기




Volumn 417, Issue , 2013, Pages 171-182

Cascading effects of common-cause failures in critical infrastructures

Author keywords

Cascading effects; Common cause failures; Infrastructure dependencies

Indexed keywords

PUBLIC WORKS; RISK ASSESSMENT;

EID: 84979016704     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-45330-4_12     Document Type: Conference Paper
Times cited : (48)

References (21)
  • 3
    • 84898382434 scopus 로고    scopus 로고
    • The telecoms inclusion principle: The missing link between critical infrastructure protection and critical information infrastructure protection
    • P. Theron and S. Bologna (Eds.), IGI Global, Hershey, Pennslyvania
    • C. Johnson, The telecoms inclusion principle: The missing link between critical infrastructure protection and critical information infrastructure protection, in Critical Information Infrastructure Protection and Resilience in the ICT Sector, P. Theron and S. Bologna (Eds.), IGI Global, Hershey, Pennslyvania, pp. 277–303, 2013.
    • (2013) Critical Information Infrastructure Protection and Resilience in the ICT Sector , pp. 277-303
    • Johnson, C.1
  • 6
    • 84898122057 scopus 로고    scopus 로고
    • Risk assessment of multi-order dependencies between critical information and communication infrastructures
    • P. Theron and S. Bologna (Eds.), IGI Global, Hershey, Pennslyvania
    • P. Kotzanikolaou, M. Theoharidou and D. Gritzalis, Risk assessment of multi-order dependencies between critical information and communication infrastructures, in Critical Information Infrastructure Protection and Resilience in the ICT Sector, P. Theron and S. Bologna (Eds.), IGI Global, Hershey, Pennslyvania, pp. 153–172, 2013.
    • (2013) Critical Information Infrastructure Protection and Resilience in the ICT Sector , pp. 153-172
    • Kotzanikolaou, P.1    Theoharidou, M.2    Gritzalis, D.3
  • 7
    • 80052763967 scopus 로고    scopus 로고
    • Springer-Verlag, London, United Kingdom
    • W. Kroger and E. Zio, Vulnerable Systems, Springer-Verlag, London, United Kingdom, 2011.
    • (2011) Vulnerable Systems
    • Kroger, W.1    Zio, E.2
  • 8
    • 23444459747 scopus 로고    scopus 로고
    • Secure electronic voting: The current landscape
    • Secure Electronic Voting, D. Gritzalis (Ed.), Boston, Massachusetts
    • C. Lambrinoudakis, D. Gritzalis, V. Tsoumas, M. Karyda and S. Ikonomopoulos, Secure electronic voting: The current landscape, in Secure Electronic Voting, D. Gritzalis (Ed.), Kluwer Academic Publishers, Boston, Massachusetts, pp. 101–122, 2003.
    • (2003) Kluwer Academic Publishers , pp. 101-122
    • Lambrinoudakis, C.1    Gritzalis, D.2    Tsoumas, V.3    Karyda, M.4    Ikonomopoulos, S.5
  • 9
    • 33947651649 scopus 로고    scopus 로고
    • Long-term verifiability of electronic healthcare record authenticity
    • D. Lekkas and D. Gritzalis, Long-term verifiability of electronic healthcare record authenticity, International Journal of Medical Informatics, vol. 76(5-6), pp. 442–448, 2007.
    • (2007) International Journal of Medical Informatics , vol.76 , Issue.5-6 , pp. 442-448
    • Lekkas, D.1    Gritzalis, D.2
  • 11
    • 11844275485 scopus 로고    scopus 로고
    • Electronic voting: Constitutional and legal requirements and their technical implications
    • Secure Electronic Voting, D. Gritzalis (Ed.), Boston, Massachusetts
    • L. Mitrou, D. Gritzalis, S. Katsikas and G. Quirchmayr, Electronic voting: Constitutional and legal requirements and their technical implications, in Secure Electronic Voting, D. Gritzalis (Ed.), Kluwer Academic Publishers, Boston, Massachusetts, pp. 43–60, 2003.
    • (2003) Kluwer Academic Publishers , pp. 43-60
    • Mitrou, L.1    Gritzalis, D.2    Katsikas, S.3    Quirchmayr, G.4
  • 12
    • 55549098577 scopus 로고    scopus 로고
    • Modeling dependencies in critical infrastructures
    • E. Goetz and S. Shenoi (Eds.), Boston, Massachusetts
    • A. Nieuwenhuijs, E. Luiijf and M. Klaver, Modeling dependencies in critical infrastructures, in Critical Infrastructure Protection, E. Goetz and S. Shenoi (Eds.), Boston, Massachusetts, pp. 205–213, 2008.
    • (2008) Critical Infrastructure Protection , pp. 205-213
    • Nieuwenhuijs, A.1    Luiijf, E.2    Klaver, M.3
  • 15
    • 0035696915 scopus 로고    scopus 로고
    • Identifying, understanding and analyzing critical infrastructure interdependencies
    • S. Rinaldi, J. Peerenboom and T. Kelly, Identifying, understanding and analyzing critical infrastructure interdependencies, IEEE Control Systems, vol. 21(6), pp. 11–25, 2001.
    • (2001) IEEE Control Systems , vol.21 , Issue.6 , pp. 11-25
    • Rinaldi, S.1    Peerenboom, J.2    Kelly, T.3
  • 16
    • 84869594453 scopus 로고    scopus 로고
    • Securing transportation-critical infrastructures: Trends and perspectives
    • C. Georgiadis, H. Jahankhani, E. Pimenidis, R. Bashroush and A. Al-Nemrat (Eds.), Springer, Heidelberg, Germany
    • M. Theoharidou, M. Kandias and D. Gritzalis, Securing transportation-critical infrastructures: Trends and perspectives, in Global Security, Safety and Sustainability and e-Democracy, C. Georgiadis, H. Jahankhani, E. Pimenidis, R. Bashroush and A. Al-Nemrat (Eds.), Springer, Heidelberg, Germany, pp. 171–178, 2012.
    • (2012) Global Security, Safety and Sustainability and E-Democracy , pp. 171-178
    • Theoharidou, M.1    Kandias, M.2    Gritzalis, D.3
  • 17
    • 84885179321 scopus 로고    scopus 로고
    • Risk-based criticality analysis
    • C. Palmer and S. Shenoi (Eds.), Springer, Heidelberg, Germany
    • M. Theoharidou, P. Kotzanikolaou and D. Gritzalis, Risk-based criticality analysis, in Critical Infrastructure Protection III, C. Palmer and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 35–49, 2009.
    • (2009) Critical Infrastructure Protection III , pp. 35-49
    • Theoharidou, M.1    Kotzanikolaou, P.2    Gritzalis, D.3
  • 18
    • 77955429216 scopus 로고    scopus 로고
    • A multi-layer criticality assessment methodology based on interdependencies
    • M. Theoharidou, P. Kotzanikolaou and D. Gritzalis, A multi-layer criticality assessment methodology based on interdependencies, Computers and Security, vol. 29(6), pp. 643–658, 2010.
    • (2010) Computers and Security , vol.29 , Issue.6 , pp. 643-658
    • Theoharidou, M.1    Kotzanikolaou, P.2    Gritzalis, D.3
  • 20
    • 79959544406 scopus 로고    scopus 로고
    • The state and the threat of cascading failures across critical infrastructures: The implications of empirical evidence from media incident reports
    • M. van Eeten, A. Nieuwenhuijs, E. Luiijf, M. Klaver and E. Cruz, The state and the threat of cascading failures across critical infrastructures: The implications of empirical evidence from media incident reports, Public Administration, vol. 89(2), pp. 381–400, 2011.
    • (2011) Public Administration , vol.89 , Issue.2 , pp. 381-400
    • Van Eeten, M.1    Nieuwenhuijs, A.2    Luiijf, E.3    Klaver, M.4    Cruz, E.5
  • 21
    • 79952192413 scopus 로고    scopus 로고
    • Modeling interdependent network systems for identifying cascade-safe operating margins
    • E. Zio and G. Sansavini, Modeling interdependent network systems for identifying cascade-safe operating margins, IEEE Transactions on Reliability, vol. 60(1), pp. 94–101, 2011.
    • (2011) IEEE Transactions on Reliability , vol.60 , Issue.1 , pp. 94-101
    • Zio, E.1    Sansavini, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.