critical infrastructure protection Articles

  • Empirical findings on European critical infrastructure dependencies

    One type of threat consistently identified as a key challenge for critical infrastructure protection (CIP) is that of dependencies and interdependencies among different critical infrastructures (CI). This article draws on a hitherto untapped data source on infrastructure dependencies: a daily maintained database containing over 4500 serious disruption events in different CI all over the world as ...


    By Inderscience Publishers

  • An international tabletop exercise on critical infrastructure protection: the lessons identified

    In 2007, a TableTop eXercise (TTX) on Critical Infrastructure Protection (CIP) was held in Sofia, Bulgaria. It was organised by the Civil Protection Committee (CPC) of the Euro-Atlantic Partnership Council (EAPC). The aim of the TTX was to identify gaps in existing policies and capabilities for the protection of the civil population and Critical Infrastructures (CIs) and to provide nations and ...


    By Inderscience Publishers

  • Infrastructure resilience through regional spatial planning – prospects of a new legal principle in Germany

    In 2008, a new principle of spatial planning was added to the German Federal Spatial Planning Act. It demands critical infrastructure protection (CIP) be taken into account in all spatial planning activities. Since the term ‘critical infrastructure’ is quite young, this problem has not yet been explicitly treated in spatial planning activities. This paper presents results from a ...


    By Inderscience Publishers

  • The state of the art in critical infrastructure protection: a framework for convergence

    The protection of critical infrastructure systems has recently become a major concern for many countries. This is due to the effect of these systems on the daily lives of all citizens and the high possibility of disruption because of their complex structure and hidden interdependencies, which subsequently attract the attention of many researchers and scientists. The investigations of researchers ...


    By Inderscience Publishers

  • Social values and material threat: the European Programme for Critical Infrastructure Protection

    Since the outset of Europe's role in the War on Terror, the protection of Europe's 'critical infrastructures' has been a central focus of the anti-terrorist effort. The purpose of this article is underscore the challenges involved in conceptualising critical infrastructure and its protection in terms of social values. These difficulties, we will suggest, are not merely roadblocks standing in the ...


    By Inderscience Publishers

  • Extensible threat taxonomy for critical infrastructures

    The European Union-sponsored project Vital Infrastructure Threats and Assurance (VITA) has the objective of exploring and showing new paths in Critical Infrastructure Protection (CIP) R&D. This paper describes one of VITA's results: the idea and the development of a novel extensible and generic threat taxonomy for Critical Infrastructures (CIs). Over 300 threats have been categorised. The threat ...


    By Inderscience Publishers

  • Detection and impact of cyber attacks in a critical infrastructures scenario: the CockpitCI approach

    The critical infrastructure protection is a key point from a social and economic point of view. The FP7 MICIE project has achieved promising results in evaluating impact of failures and faults in interdependent physical systems, as critical infrastructures. In order to achieve this goal, the consortium developed an online risk prediction tool, able to acquire information by local physical ...


    By Inderscience Publishers

  • 3D tactics: an advanced warfare concept in critical infrastructure protection

    The three dimensional tactics concept is adopted from recent formulations of ‘spherical security’. This is adapted to develop a conceptual approach to vulnerability analysis in counter terrorism planning, dealing with the problems where there is no intelligence-based threat analysis, and an attack can come from any direction. The UK Intelligence and Security Committee report on the ...


    By Inderscience Publishers

  • The socio-political dimensions of critical information infrastructure protection (CIIP)

    At present, the topic of critical information infrastructure protection (CIIP) is mainly discussed in the domain of engineers, consultants, and IT security experts. All these communities address important aspects of the problem complex, but hardly ever deal with socio-political ones. This paper addresses the need for a greater role of the social sciences in the field, due to a range of important ...


    By Inderscience Publishers

  • Simulation experiments: the emerging instruments for CIP

    Critical Infrastructures (CIs) are vital backbones of modern societies and are increasingly depending on Information Technology (IT) and communication networks. Due to the increasing IT penetration, CIs are more and more connected with each other, with advantages and disadvantages. Due to this interconnection, CIs can provide their services more cost-efficiently. On the other hand, in case of ...


    By Inderscience Publishers

  • Protective measures and vulnerability indices for the Enhanced Critical Infrastructure Protection Programme

    Argonne National Laboratory in partnership with the US Department of Homeland Security (DHS) has developed a methodology to systematically evaluate the protection posture and vulnerability of critical infrastructure and key resources (CIKR). This vulnerability methodology is part of a larger effort by DHS called the Enhanced Critical Infrastructure Protection Programme, which seeks to mitigate ...


    By Inderscience Publishers

  • Protection of the Dutch critical infrastructures

    Societies are increasingly dependent on a set of critical products and services which comprise the Critical Infrastructure (CI). Using a methodological approach, The Netherlands determined its critical products and service and analysed the critical dependencies. The relative importance of a critical product or service was determined based upon both its importance for other critical products and ...


    By Inderscience Publishers

  • The governance of cybersecurity: a framework for policy

    Problems with information and network security have quickly moved up the political agenda. The current discussion on the governance of cybersecurity primarily focuses on technological measures and awareness raising. Although these certainly are important issues, the debate is lacking a framework to identify what role is appropriate for government. This paper provides a framework to assess what ...


    By Inderscience Publishers

  • Assessing n–order dependencies between critical infrastructures

    The protection of critical infrastructures (CI) is a complex task, since it involves the assessment of both internal and external security risk. In the recent literature, methodologies have been proposed that can be used to identify organisation–wise security threats, or even first–order dependency risk (i.e., risk deriving from direct dependencies). However, there is a lack of work ...


    By Inderscience Publishers

  • R&D activities in Europe on critical information infrastructure protection

    In the last few years, there has been an increasing worry about Critical Information Infrastructures, their reliability, security and protection. Due to the huge complexity and novelty of the topic and the new challenge that it poses, world-wide large investment in R&D are planned for the future. Our study has shown that Critical Information Infrastructure Protection (CIIP) represents still a ...


    By Inderscience Publishers

  • Vulnerability analysis of the physical part of the internet

    The internet, one of the most important critical information infrastructures (CII), compasses both, the physical and cyber part. Industrial network operators and service providers often draw more attention to the protection of the cyber part. However, some recent incidents, especially those causing cascading failures and big disruptions in social functions, are reminders that physical part may be ...


    By Inderscience Publishers

  • Systemic determination of infrastructure criticality

    The aim of critical infrastructure (CI) research efforts is to develop strategies to protect infrastructure systems by reducing hazards, risks, and threats from natural and manmade events. Given that no nation has unlimited resources, the current trend is to prioritise infrastructures so that the most 'critical' infrastructure systems are given priority in terms of resources. An extensive ...


    By Inderscience Publishers

  • Test data for anomaly detection in the electricity infrastructure

    This paper describes a large set of electricity data for the IEEE 24 bus system generated on a test bed that copies the cyber layer of the electricity infrastructure in some detail. This data has been filtered and corrupted with natural noise and a realistic set of failure-induced and attack-induced corruptions. One of the main applications of this data is the development of novel ...


    By Inderscience Publishers

  • Business-oriented model-driven development of services in civil protection

    The development of a new software-intensive service for an organisation usually implies changes in the organisational processes. This is especially true in the development of an emergency management system where heterogeneous architectures and software application structures have to be integrated. In these situations, many organisations and governmental departments involved in facing emergencies ...


    By Inderscience Publishers

  • A smart decision support systems based on a fast classifier and a semantic post reasoner

    In modern monitoring systems for critical infrastructures protection, there is the need to design automatic decision support systems with high reliability and real-time constraints. These features are usually in contrast as there is a significant trade-off between performance and precision. In this paper, we propose an innovative approach for smart event detection and enriched phenomena ...


    By Inderscience Publishers

Need help finding the right suppliers? Try XPRT Sourcing. Let the XPRTs do the work for you