Pages | Title and author(s) |
1-17 | System of systems engineering: an emerging multidisciplineAndres Sousa-Poza, Samuel Kovacic, Charles Keating DOI: 10.1504/IJSSE.2008.018129 |
18-58 | Littoral undersea warfare: a case study in process modelling for functionality and interoperability of complex systemsVictor 'Dirk' Bindi, John Strunk, Jeffery Baker, Roger Bacon, Matthew G. Boensel, Francis E. Shoup III, Ravi Vaidyanathan DOI: 10.1504/IJSSE.2008.018130 |
59-77 | Abstraction-based analysis of known and unknown vulnerabilities of critical information infrastructuresRoland Rieke DOI: 10.1504/IJSSE.2008.018131 |
78-95 | The CRUTIAL reference critical information infrastructure architecture: a blueprintPaulo Verissimo, Nuno Ferreira Neves, Miguel Correia DOI: 10.1504/IJSSE.2008.018132 |
96-110 | Enforcing trust in pervasive computingShiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen DOI: 10.1504/IJSSE.2008.018133 |
111-127 | Conceptualising social engineering attacks through system archetypesJose M. Sarriegi, Jose J. Gonzalez DOI: 10.1504/IJSSE.2008.018134 |
128-148 | Trust establishment in sensor networks: behaviour-based, certificate-based and a combinational approachEfthimia Aivaloglou, Stefanos Gritzalis, Charalabos Skianis DOI: 10.1504/IJSSE.2008.018135 |
149-170 | Early warning system for home users and small- and medium-sized enterprises: eight lessons learnedUrs E. Gattiker DOI: 10.1504/IJSSE.2008.018136 |
171-188 | A research agenda for systems of systems architectingRicardo Valerdi, Elliot Axelband, Thomas Baehren, Barry Boehm, Dave Dorenbos, Scott Jackson, Azad Madni, Gerald Nadler, Paul Robitaille, Stan Settles DOI: 10.1504/IJSSE.2008.018137 |
189-221 | Mining intelligence data in the benefit of critical infrastructures security: vulnerability modelling, simulation and assessment, system of systems engineeringAdrian V. Gheorghe, Dan Vamanu DOI: 10.1504/IJSSE.2008.018142 |
222-236 | Models for risk management of systems of systemsYacov Y. Haimes DOI: 10.1504/IJSSE.2008.018138 |
237-256 | Risk management of an information infrastructure: a framework based upon security dependenciesF. Baiardi, C. Telmon DOI: 10.1504/IJSSE.2008.018139 |
257-270 | R&D activities in Europe on critical information infrastructure protectionSandro Bologna, Eric Luiijf, Roberto Setola DOI: 10.1504/IJSSE.2008.018140 |
271-292 | Network-centric military system architecture assessment methodologyOsman Balci, William F. Ormsby DOI: 10.1504/IJSSE.2008.018141 |