Cite

J. D. Moteff, “Critical infrastructures: Background, policy, and implementation” (DIANE Publishing, 2010) Search in Google Scholar

S. M. Rinaldi, J. P. Peerenboom and T. K. Kelly. “Identifying, understanding, and analyzing critical infrastructure interdependencies.” Control Systems, IEEE 21.6 (2001), pp. 1125. Search in Google Scholar

P. Pederson et al. “Critical infrastructure interdependency modeling: a survey of US and international research.” Idaho National Laboratory (2006), pp. 1-20. Search in Google Scholar

S. V. Buldyrev et al. “Catastrophic cascade of failures in interdependent networks.” Nature 464.7291 (2010), pp. 1025-1028.10.1038/nature0893220393559 Search in Google Scholar

I. Dobson et al. “Complex systems analysis of series of blackouts: Cascading failure, critical points, and self-organization.” Chaos: An Interdisciplinary Journal of Nonlinear Science 17.2 (2007), pp. 026103.10.1063/1.273782217614690 Search in Google Scholar

L. Duenas-Osorio and S. M. Vemuru. “Cascading failures in complex infrastructure systems.” Structural safety 31.2 (2009), pp. 157-167. Search in Google Scholar

R. Klein, “Information Modelling and Simulation in Large Dependent Critical Infrastructures-An Overview on the European Integrated Project IRRIIS.” Critical Information Infrastructure Security. Springer Berlin Heidelberg, 2009, pp. 131-143.10.1007/978-3-642-03552-4_12 Search in Google Scholar

P. Capodieci et al. “Improving resilience of interdependent critical infrastructures via an on-line alerting system.” Complexity in Engineering (COMPENG’10), IEEE, 2010, pp 88-90.10.1109/COMPENG.2010.28 Search in Google Scholar

F. Caldeira et al. “Secure mediation gateway architecture enabling the communication among critical infrastructures.” Future Network and Mobile Summit, IEEE, 2010, pp. 1-8. Search in Google Scholar

J. W. Morentz, “Unified incident command and decision support (UICDS): a Department of Homeland Security initiative in information sharing.” Technologies for Homeland Security, 2008 IEEE Conference on. IEEE, 2008, pp. 321-326.10.1109/THS.2008.4534471 Search in Google Scholar

H. Gjermundrod et al. “GridStat: A flexible QoS-managed data dissemination framework for the power grid.” Power Delivery, IEEE Transactions on 24.1 (2009), pp. 136-143..10.1109/TPWRD.2008.917693 Search in Google Scholar

G. Pardo-Castellote, “OMG data-distribution service: Architectural overview.” Distributed Computing Systems Workshops, 2003. Proceedings. 23rd International Conference on. IEEE, 2003, pp. 200-206. Search in Google Scholar

M. Cinque, C. Di Martino and C. Esposito. “On data dissemination for large-scale complex critical infrastructures.” Computer Networks 56.4 (2012), pp. 1215-1235. Search in Google Scholar

S. Cherukuwada, “Distributed Object Technology: Security Perspective”, SANS Institute white paper, 2002, http://www.sans.org/reading-room/whitepapers/application/distributed-object-technology-security-perspective-17, retrieved on June 1, 2015. Search in Google Scholar

“CORBA Security Service Specifications v1.8”, The Object Management Group, 2002. Search in Google Scholar

J. Linn, “Generic Security Service Application Program Interface, Version 2”, RFC 2078, 1997, https://tools.ietf.org/html/rfc2078, retrieved on June 13, 2015.10.17487/rfc2078 Search in Google Scholar

A. Medina et al. “BRITE: An approach to universal topology generation.” Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 2001. Proceedings. Ninth International Symposium on. IEEE, 2001, pp. 346-353.W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 1993, pp. 123-135. Search in Google Scholar

eISSN:
1178-5608
Language:
English
Publication timeframe:
Volume Open
Journal Subjects:
Engineering, Introductions and Overviews, other