International Journal of Critical Infrastructures (IJCIS)

International Journal of Critical Infrastructures

2008 Vol.4 No.1/2

Special Issue on Complex Network and Infrastructure Protection

Guest Editor: Sandro Bologna


Pages Title and author(s)
3-16Security, trust, and QoS in next-generation control and communication for large power systems
Carl H. Hauser, David E. Bakken, Ioanna Dionysiou, K. Harald Gjermundrod, Venkata S. Irava, Joel Helkey, Anjan Bose
DOI: 10.1504/IJCIS.2008.016088
17-31Dynamic recovery of critical infrastructures: real-time temporal coordination
Jose R. Marti, Jorge A. Hollman, Carlos Ventura, Juri Jatskevich
DOI: 10.1504/IJCIS.2008.016089
32-45The security of power systems and the role of information and communication technologies: lessons from the recent blackouts
Alberto Stefanini, Marcelo Masera
DOI: 10.1504/IJCIS.2008.016090
46-62Modelling of cascading effects and efficient response to disaster spreading in complex networks
K. Peters, L. Buzna, D. Helbing
DOI: 10.1504/IJCIS.2008.016091
63-79Modelling interdependent infrastructures using interacting dynamical models
V. Rosato, L. Issacharoff, F. Tiriticco, S. Meloni, S. De Porcellinis, R. Setola
DOI: 10.1504/IJCIS.2008.016092
80-95Security assessment in complex networks exposed to terrorist hazard: a simulation approach
Enrico Zio, Claudio M. Rocco S.
DOI: 10.1504/IJCIS.2008.016093
96-109Agents controlling the electric power infrastructure
T. Rigole, K. Vanthournout, K. De Brabandere, G. Deconinck
DOI: 10.1504/IJCIS.2008.016094
110-128Simulation of heterogeneous and interdependent critical infrastructures
S. De Porcellinis, R. Setola, S. Panzieri, G. Ulivi
DOI: 10.1504/IJCIS.2008.016095
129-143Effects of intentional threats to power substation control systems
Giovanna Dondossola, Judit Szanto, Marcelo Masera, Igor Nai Fovino
DOI: 10.1504/IJCIS.2008.016096

Additional Papers

144-152Quantitative Vulnerability Assessment of Critical Infrastructures: watching for hidden faults
Adrian V. Gheorghe, Dan V. Vamanu
DOI: 10.1504/IJCIS.2008.016097
153-171Understanding threats: a prerequisite to enhance survivability of computing systems
F. Pouget, M. Dacier, V.H. Pham
DOI: 10.1504/IJCIS.2008.016098
172-184A systematic procedure for analysing network systems
E. Zio, G. Sansavini
DOI: 10.1504/IJCIS.2008.016099
185-205The HoneyTank: a scalable approach to collect malicious internet traffic
Nicolas Vanderavero, Xavier Brouckaert, Olivier Bonaventure, Baudouin Le Charlier
DOI: 10.1504/IJCIS.2008.016100

Technical Note

206-214Predicting target selection by terrorists: a network analysis of the 2005 London underground attacks
Ferenc Jordan
DOI: 10.1504/IJCIS.2008.016101