1 - 4 of 4 articles
The Stuxnet appears to be the very first cyber-attack upon industrial control systems. It has forced cybersecurity providers to put a lot of attention on outdated and obsolete security countermeasures of existing critical infrastructure systems due to the poor protection and security....
Blockchain is probably best known as a technology that underpins bitcoin cryptocurrency, taking records (e.g., confirmed financial transactions) and placing them into 'blocks', which are linked to prior blocks - forming a chronological 'chain' of blocks. However, bitcoin blockchain is only one...
All critical infrastructures (CIs) are already very complex and it is getting more complicated as different systems are integrated with each other. For this reason, implementing a mathematical model for critical infrastructure is a rarely researched topic. In this study, we investigate an...
We extend the concept of a critical infrastructure (CI) network's vulnerability and advance a methodological approach for identifying the vulnerability of a CI extended over a large expanse of space - Manhattan's motor fuel supply chain - in the face of extreme weather events. In the...
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.