A new polynomial-time algorithm for linear programming
Combinatorica
Small worlds: the dynamics of networks between order and randomness
Small worlds: the dynamics of networks between order and randomness
Modeling and Simulating Critical Infrastructures and Their Interdependencies
HICSS '04 Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 2 - Volume 2
The Diameter of a Scale-Free Random Graph
Combinatorica
General methodology 3: a parallel simulation framework for infrastructure modeling and analysis
Proceedings of the 34th conference on Winter simulation: exploring new frontiers
Simulation and Gaming
GIS-based Command and Control Infrastructure for Critical Infrastructure Protection
IWCIP '05 Proceedings of the First IEEE International Workshop on Critical Infrastructure Protection
The Structure and Dynamics of Networks: (Princeton Studies in Complexity)
The Structure and Dynamics of Networks: (Princeton Studies in Complexity)
CIMS: a framework for infrastructure interdependency modeling and analysis
Proceedings of the 38th conference on Winter simulation
Adversarial Deletion in a Scale-Free Random Graph Process
Combinatorics, Probability and Computing
Simulation and Gaming
Dynamical Processes on Complex Networks
Dynamical Processes on Complex Networks
Modeling and Simulation of Complex Interdependent Systems: A Federated Agent-Based Approach
Critical Information Infrastructure Security
Disaster Propagation in Heterogeneous Media via Markovian Agents
Critical Information Infrastructure Security
A Study on Multiformalism Modeling of Critical Infrastructures
Critical Information Infrastructure Security
Controllability of Multi-Agent Systems from a Graph-Theoretic Perspective
SIAM Journal on Control and Optimization
Quantitative analysis of information security interdependency between industrial sectors
ESEM '09 Proceedings of the 2009 3rd International Symposium on Empirical Software Engineering and Measurement
Macro and Micro Agent-Based Modeling and Simulation of Critical Infrastructures
COMPENG '10 Proceedings of the 2010 Complexity in Engineering
Handbook of Large-Scale Random Networks: Bolyai Society Mathematical Studies
Handbook of Large-Scale Random Networks: Bolyai Society Mathematical Studies
On modelling of inter-dependent network infrastructures by extended Leontief models
CRITIS'09 Proceedings of the 4th international conference on Critical information infrastructures security
Impact of random failures and attacks on Poisson and power-law random networks
ACM Computing Surveys (CSUR)
Collaborative Modeling of Awareness in Critical Infrastructure Protection
HICSS '11 Proceedings of the 2011 44th Hawaii International Conference on System Sciences
A framework for conceptualizing social engineering attacks
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
An analysis of cyclical interdependencies in critical infrastructures
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
Modeling and simulating information security management
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
A formal adversary capability model for SCADA environments
CRITIS'10 Proceedings of the 5th international conference on Critical Information Infrastructures Security
Hi-index | 0.00 |
Understanding and mitigating risks and threats to critical infrastructures relies heavily on the ability to construct and validate models often involving physical systems or even human intervention. This, together with the wide range of scales from critical systems such as industrial process control systems of critical facilities to interactions among multiple sectors up to and including a global scale presents a very large problem space which can only be conquered by an equally broad range of modelling techniques commensurate to the infrastructure aspects being studied. Sophisticated domain-specific models do not necessarily provide the type of insight into dependencies and interactions, which are often driven by information and communication systems and necessitate the study of novel models. Similarly, however, conventional information security research is typically not concerned with interactions of information systems with physical environment, while at the same time conventional infrastructure models emphasise on well-understood statistical event models rather than considering adversarial behaviour.