International Journal of System of Systems Engineering (IJSSE)

International Journal of System of Systems Engineering

2008 Vol.1 No.1/2


Pages Title and author(s)
1-17System of systems engineering: an emerging multidiscipline
Andres Sousa-Poza, Samuel Kovacic, Charles Keating
DOI: 10.1504/IJSSE.2008.018129
18-58Littoral undersea warfare: a case study in process modelling for functionality and interoperability of complex systems
Victor 'Dirk' Bindi, John Strunk, Jeffery Baker, Roger Bacon, Matthew G. Boensel, Francis E. Shoup III, Ravi Vaidyanathan
DOI: 10.1504/IJSSE.2008.018130
59-77Abstraction-based analysis of known and unknown vulnerabilities of critical information infrastructures
Roland Rieke
DOI: 10.1504/IJSSE.2008.018131
78-95The CRUTIAL reference critical information infrastructure architecture: a blueprint
Paulo Verissimo, Nuno Ferreira Neves, Miguel Correia
DOI: 10.1504/IJSSE.2008.018132
96-110Enforcing trust in pervasive computing
Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen
DOI: 10.1504/IJSSE.2008.018133
111-127Conceptualising social engineering attacks through system archetypes
Jose M. Sarriegi, Jose J. Gonzalez
DOI: 10.1504/IJSSE.2008.018134
128-148Trust establishment in sensor networks: behaviour-based, certificate-based and a combinational approach
Efthimia Aivaloglou, Stefanos Gritzalis, Charalabos Skianis
DOI: 10.1504/IJSSE.2008.018135
149-170Early warning system for home users and small- and medium-sized enterprises: eight lessons learned
Urs E. Gattiker
DOI: 10.1504/IJSSE.2008.018136
171-188A research agenda for systems of systems architecting
Ricardo Valerdi, Elliot Axelband, Thomas Baehren, Barry Boehm, Dave Dorenbos, Scott Jackson, Azad Madni, Gerald Nadler, Paul Robitaille, Stan Settles
DOI: 10.1504/IJSSE.2008.018137
189-221Mining intelligence data in the benefit of critical infrastructures security: vulnerability modelling, simulation and assessment, system of systems engineering
Adrian V. Gheorghe, Dan Vamanu
DOI: 10.1504/IJSSE.2008.018142
222-236Models for risk management of systems of systems
Yacov Y. Haimes
DOI: 10.1504/IJSSE.2008.018138
237-256Risk management of an information infrastructure: a framework based upon security dependencies
F. Baiardi, C. Telmon
DOI: 10.1504/IJSSE.2008.018139
257-270R&D activities in Europe on critical information infrastructure protection
Sandro Bologna, Eric Luiijf, Roberto Setola
DOI: 10.1504/IJSSE.2008.018140
271-292Network-centric military system architecture assessment methodology
Osman Balci, William F. Ormsby
DOI: 10.1504/IJSSE.2008.018141