International Journal of Critical Infrastructures
2004 - 2025
From Inderscience Enterprises Ltd Bibliographic data for series maintained by Sarah Parker (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 4, issue 4, 2008
- Profiling coordinated cyber incidents towards the critical infrastructure in Norway pp. 335-352

- Maria Kjaerland
- The operational tools for managing physical interdependencies among critical infrastructures pp. 353-367

- Benoit Robert and Luciano Morabito
- Critical issues with 'minor league' nuclear infrastructures: the back end of the life cycle pp. 368-391

- Dan V. Vamanu, Adrian V. Gheorghe, Valentin T. Acasandrei and Bogdan I. Vamanu
- Modelling interdependencies among critical infrastructures pp. 392-408

- Benoit Robert, Renaud De Calan and Luciano Morabito
- Extensible threat taxonomy for critical infrastructures pp. 409-417

- H.A.M. Luiijf and A.H. Nieuwenhuijs
- Human factors in system reliability: lessons learnt from the Maeslant storm surge barrier in The Netherlands pp. 418-429

- Jos Vrancken, Jan Van den Berg and Michel Dos Santos Soares
- Forest fire essentials: a cellular automaton-wise, percolation-oriented model pp. 430-444

- Adrian V. Gheorghe and Dan V. Vamanu
- NATO and Old Dominion University co-host disaster and incident management symposium pp. 445-454

- Mike McGinnis and Wayne Buck
Volume 4, issue 3, 2008
- The state of the art in critical infrastructure protection: a framework for convergence pp. 215-244

- Ali A. Ghorbani and Ebrahim Bagheri
- Security and privacy threats to volunteer computing pp. 245-255

- J.H. Abawajy
- Social network analysis of the vulnerabilities of interdependent critical infrastructures pp. 256-273

- W.J. Zhang, X. Liu, Choon-Lee Chai, Ralph Deters, D. Liu, Dmytro Dyachuk, Y.L. Tu and Zaheer Baber
- A disaster response management system based on the control systems technology pp. 274-295

- Y.L. Tu, W.J. Zhang, X. Liu, W. Li, C-L. Chai and R. Deters
- The design and prototype of RUDA, a distributed grid accounting system pp. 296-307

- Meili Chen, Al Geist, David E. Bernholdt, Kasidit Chanchio and Daniel L. Million
- Dynamic and fine-grained authentication and authorisation for grid computing pp. 308-318

- Hyunjoon Jung, Hyuck Han, Hyungsoo Jung and Heon Y. Yeom
- GIVS: integrity validation for grid security pp. 319-333

- Stefano Zanero and Giuliano Casale
Volume 4, issue 1/2, 2008
- Security, trust, and QoS in next-generation control and communication for large power systems pp. 3-16

- Carl H. Hauser, David E. Bakken, Ioanna Dionysiou, K. Harald Gjermundrod, Venkata S. Irava, Joel Helkey and Anjan Bose
- Dynamic recovery of critical infrastructures: real-time temporal coordination pp. 17-31

- Jose R. Marti, Jorge A. Hollman, Carlos Ventura and Juri Jatskevich
- The security of power systems and the role of information and communication technologies: lessons from the recent blackouts pp. 32-45

- Alberto Stefanini and Marcelo Masera
- Modelling of cascading effects and efficient response to disaster spreading in complex networks pp. 46-62

- K. Peters, L. Buzna and D. Helbing
- Modelling interdependent infrastructures using interacting dynamical models pp. 63-79

- V. Rosato, L. Issacharoff, F. Tiriticco, S. Meloni, S. De Porcellinis and R. Setola
- Security assessment in complex networks exposed to terrorist hazard: a simulation approach pp. 80-95

- Enrico Zio and Claudio M. Rocco S.
- Agents controlling the electric power infrastructure pp. 96-109

- T. Rigole, K. Vanthournout, K. De Brabandere and G. Deconinck
- Simulation of heterogeneous and interdependent critical infrastructures pp. 110-128

- S. De Porcellinis, R. Setola, S. Panzieri and G. Ulivi
- Effects of intentional threats to power substation control systems pp. 129-143

- Giovanna Dondossola, Judit Szanto, Marcelo Masera and Igor Nai Fovino
- Quantitative Vulnerability Assessment of Critical Infrastructures: watching for hidden faults pp. 144-152

- Adrian V. Gheorghe and Dan V. Vamanu
- Understanding threats: a prerequisite to enhance survivability of computing systems pp. 153-171

- F. Pouget, M. Dacier and V.H. Pham
- A systematic procedure for analysing network systems pp. 172-184

- E. Zio and G. Sansavini
- The HoneyTank: a scalable approach to collect malicious internet traffic pp. 185-205

- Nicolas Vanderavero, Xavier Brouckaert, Olivier Bonaventure and Baudouin Le Charlier
- Predicting target selection by terrorists: a network analysis of the 2005 London underground attacks pp. 206-214

- Ferenc Jordan
Volume 3, issue 3/4, 2007
- An evolving paradigm for managing hazardous materials transportation risk pp. 268-286

- Mark Abkowitz, John Allen, Art Greenberg, Mark Lepofsky and Tom McSweeney
- Requirements for transport network flow models used in reliability analysis pp. 287-300

- Y. Asakura
- Flight-delay propagation, allowing for behavioural response pp. 301-326

- Chaug-Ing Hsu, Che-Chang Hsu and Hui-Chieh Li
- Disaster and degradation management: relevance of the concept of flexibility pp. 327-345

- Edward K. Morlok and David J. Chang
- Road network unreliability: impact assessment and mitigation pp. 346-375

- A.J. Nicholson
- Review of pedestrian and evacuation simulations pp. 376-388

- G. Keith Still
- A framework for evaluating risk to the transportation network from terrorism and security policies pp. 389-407

- Pamela M. Murray-Tuite
- Competitive egress behaviour: a fuzzy logic-inspired microscopic model pp. 408-429

- Mauro Dell'Orco
- Airport availability modelling: a different perspective pp. 430-456

- Jasenka Rakas and Myron Hecht
- Risk and vulnerability games. The anti-satellite weaponry (ASAT) pp. 457-470

- Adrian V. Gheorghe and Dan V. Vamanu
- Social values and material threat: the European Programme for Critical Infrastructure Protection pp. 471-487

- J. Peter Burgess
- From complexity science to reliability efficiency: a new way of looking at complex network systems and critical infrastructures pp. 488-508

- E. Zio
Volume 3, issue 1/2, 2007
- Critical infrastructures: the need for international risk governance pp. 3-19

- Adrian V. Gheorghe, Marcelo Masera, Laurens De Vries, Margot Weijnen and Wolfgang Kroger
- Intelligent power routers: a distributed coordination approach for electric energy processing networks pp. 20-57

- Agustin A. Irizarry-Rivera, Manuel Rodriguez-Martinez, Bienvenido Velez, Miguel Velez-Reyes, Alberto R. Ramirez-Orquin, Efrain O'Neill-Carrillo and Jose R. Cedeno
- Intrusion detection through SCADA systems using fuzzy logic-based state estimation methods pp. 58-87

- Keith E. Holbert, Amitabh Mishra and Lamine Mili
- Power circuit breaker using micro-mechanical switches pp. 88-100

- George G. Karady and Gerald Thomas Heydt
- Mitigation of voltage collapse through active dynamic buffers pp. 101-123

- Wayne W. Weaver and Philip T. Krein
- Social impact based contingency screening and ranking pp. 124-141

- James A. Momoh, Yi Zhang, Philip Fanara Jr., Haydar Kurban and L. Jide Iwarere
- Cournot equilibria in two-settlement electricity markets with system contingencies pp. 142-160

- Jian Yao, Shmuel S. Oren and Ilan Adler
- Dynamical models for fault detection in squirrel cage induction motors pp. 161-191

- H. Rodriguez-Cortes, C.N. Hadjicostis and A.M. Stankovic
- Controlling cascading failures with cooperative autonomous agents pp. 192-220

- Paul Hines and Sarosh Talukdar
- The effects of dynamic residential load participation: penetration levels for operational impact on reliability pp. 221-234

- Steven R. Harper, Deborah L. Thurston and Philip T. Krein
- An interdisciplinary approach to long-term modelling for power system expansion pp. 235-264

- Aleksandar Dimitrovski, Andrew Ford and Kevin Tomsovic
| |