protect critical infrastructure Articles

  • Protection of the Dutch critical infrastructures

    Societies are increasingly dependent on a set of critical products and services which comprise the Critical Infrastructure (CI). Using a methodological approach, The Netherlands determined its critical products and service and analysed the critical dependencies. The relative importance of a critical product or service was determined based upon both its importance for other critical products and ...


    By Inderscience Publishers

  • An interoperable simulation framework for protecting port as critical infrastructures

    The research proposes an interoperable simulation framework intended to analyse and investigate security issues in complex maritime scenarios affected by asymmetric threats (i.e., terrorist attacks). To this end, particular attention is paid on security issues related to people and goods flows within seaports. Moreover, the proposed simulation framework is addressed to decision makers and ...


    By Inderscience Publishers

  • The state of the art in critical infrastructure protection: a framework for convergence

    The protection of critical infrastructure systems has recently become a major concern for many countries. This is due to the effect of these systems on the daily lives of all citizens and the high possibility of disruption because of their complex structure and hidden interdependencies, which subsequently attract the attention of many researchers and scientists. The investigations of researchers ...


    By Inderscience Publishers

  • Seismic protection of critical infrastructures through innovative technologies

    Development of new technologies for seismic protection will better support the sustainable urban systems. The paper focuses on development of an innovative technology for seismic protection of bridges using smart materials. The seismic protection of structures with the use of special devices is widely accepted as a very effective technique, both for new constructions and for retrofitting of ...


    By Inderscience Publishers

  • Systemic determination of infrastructure criticality

    The aim of critical infrastructure (CI) research efforts is to develop strategies to protect infrastructure systems by reducing hazards, risks, and threats from natural and manmade events. Given that no nation has unlimited resources, the current trend is to prioritise infrastructures so that the most 'critical' infrastructure systems are given priority in terms of resources. An extensive ...


    By Inderscience Publishers

  • Protecting critical infrastructures through behavioural observation

    The increase in the use of ICT in critical infrastructures has meant that dependence on automation and control systems has brought new risk in an increasingly digital age. The increase in digitisation and interconnectivity has meant that cyber–attacks have the potential to bring operations to a halt from a remote location with devastating consequences. In response to this, in our previous work to ...


    By Inderscience Publishers

  • Protective measures and vulnerability indices for the Enhanced Critical Infrastructure Protection Programme

    Argonne National Laboratory in partnership with the US Department of Homeland Security (DHS) has developed a methodology to systematically evaluate the protection posture and vulnerability of critical infrastructure and key resources (CIKR). This vulnerability methodology is part of a larger effort by DHS called the Enhanced Critical Infrastructure Protection Programme, which seeks to mitigate ...


    By Inderscience Publishers

  • Extensible threat taxonomy for critical infrastructures

    The European Union-sponsored project Vital Infrastructure Threats and Assurance (VITA) has the objective of exploring and showing new paths in Critical Infrastructure Protection (CIP) R&D. This paper describes one of VITA's results: the idea and the development of a novel extensible and generic threat taxonomy for Critical Infrastructures (CIs). Over 300 threats have been categorised. The threat ...


    By Inderscience Publishers

  • Modelling interdependencies among critical infrastructures

    Over the years, Critical Infrastructures (CIs) have become increasingly automated and interlinked. This linkage between CIs results in a very complex and dynamic system which increases their vulnerability to failures. In fact, interdependencies between CIs are a true means of propagation of hazards from one network to another. Thus, when an infrastructure is experiencing difficulties and ...


    By Inderscience Publishers

  • An international tabletop exercise on critical infrastructure protection: the lessons identified

    In 2007, a TableTop eXercise (TTX) on Critical Infrastructure Protection (CIP) was held in Sofia, Bulgaria. It was organised by the Civil Protection Committee (CPC) of the Euro-Atlantic Partnership Council (EAPC). The aim of the TTX was to identify gaps in existing policies and capabilities for the protection of the civil population and Critical Infrastructures (CIs) and to provide nations and ...


    By Inderscience Publishers

  • The socio-political dimensions of critical information infrastructure protection (CIIP)

    At present, the topic of critical information infrastructure protection (CIIP) is mainly discussed in the domain of engineers, consultants, and IT security experts. All these communities address important aspects of the problem complex, but hardly ever deal with socio-political ones. This paper addresses the need for a greater role of the social sciences in the field, due to a range of important ...


    By Inderscience Publishers

  • Social values and material threat: the European Programme for Critical Infrastructure Protection

    Since the outset of Europe's role in the War on Terror, the protection of Europe's 'critical infrastructures' has been a central focus of the anti-terrorist effort. The purpose of this article is underscore the challenges involved in conceptualising critical infrastructure and its protection in terms of social values. These difficulties, we will suggest, are not merely roadblocks standing in the ...


    By Inderscience Publishers

  • R&D activities in Europe on critical information infrastructure protection

    In the last few years, there has been an increasing worry about Critical Information Infrastructures, their reliability, security and protection. Due to the huge complexity and novelty of the topic and the new challenge that it poses, world-wide large investment in R&D are planned for the future. Our study has shown that Critical Information Infrastructure Protection (CIIP) represents still a ...


    By Inderscience Publishers

  • 3D tactics: an advanced warfare concept in critical infrastructure protection

    The three dimensional tactics concept is adopted from recent formulations of ‘spherical security’. This is adapted to develop a conceptual approach to vulnerability analysis in counter terrorism planning, dealing with the problems where there is no intelligence-based threat analysis, and an attack can come from any direction. The UK Intelligence and Security Committee report on the ...


    By Inderscience Publishers

  • Risk management goals and identification of critical infrastructures

    Strategic goals help streamlining risk management efforts, and criticality assessments of infrastructures benefit from such goals. This paper offers an introduction into recent German civil protection activities on this topic at national level. It offers a transferable concept on how to identify, document and justify priorities regarding critical infrastructure services. Based on human values it ...


    By Inderscience Publishers

  • High-level modelling of critical infrastructures' interdependencies

    Due to the increasing demand in services' quality and the growing concerns about external threats, the protection of critical infrastructures has recently become a major concern. In this article, we study the potential effect of interdependencies that may occur between two of these infrastructures: the telecommunication networks and the electrical network. In the absence of side protection ...


    By Inderscience Publishers

  • Behaviour analysis techniques for supporting critical infrastructure security

    Protecting critical infrastructures from cyber–threats in an increasingly digital age is a matter of growing urgency for governments and private industries across the globe. In a climate where cyber safety is an uncertainty, fresh and adaptive solutions to existing computer security approaches are a must. In this paper, we present our approach to supporting critical infrastructure security. Data ...


    By Inderscience Publishers

  • Models for reducing the risk of critical networked infrastructures

    In this paper, we review the literature studying how to reduce the disruption risk to critical networked infrastructures. This is an important area of research because huge consequences result from infrastructure disruptions. As a result, this research area has grown a lot in the last decade. In this review we discuss articles from the literature, place them into categories, and suggest topics ...


    By Inderscience Publishers

  • Empirical findings on European critical infrastructure dependencies

    One type of threat consistently identified as a key challenge for critical infrastructure protection (CIP) is that of dependencies and interdependencies among different critical infrastructures (CI). This article draws on a hitherto untapped data source on infrastructure dependencies: a daily maintained database containing over 4500 serious disruption events in different CI all over the world as ...


    By Inderscience Publishers

  • Regional critical infrastructure assessment: Kansas City

    The National Infrastructure Protection Plan defines 18 critical infrastructure and key resources sectors assigned to nine various sector-specific agencies charged with the protection of that component of infrastructure (2009). This breakdown by the NIPP scratches the surface in terms of illustrating the high level of vulnerability existing in our country; however, there is still a lot of work ...


    By Inderscience Publishers

Need help finding the right suppliers? Try XPRT Sourcing. Let the XPRTs do the work for you