Access the full text.
Sign up today, get DeepDyve free for 14 days.
D. Newman, B. Nkei, B. Carreras, I. Dobson, V. Lynch, Paul Gradney (2005)
Risk Assessment in Complex Interacting Infrastructure SystemsProceedings of the 38th Annual Hawaii International Conference on System Sciences
Brian Haig (2018)
Exploratory Data AnalysisMathematical Statistics with Resampling and R
S. Mathew, Chintan Shah, S. Upadhyaya (2005)
An alert fusion framework for situation awareness of coordinated multistage attacksThird IEEE International Workshop on Information Assurance (IWIA'05)
Jonathan Carter, A. Ghorbani, S. Marsh (2002)
Architectural Components of Information–Sharing SocietiesComputational Intelligence, 18
Y. Haimes, Duan Li (1991)
A hierarchical-multiobjective framework for risk managementAutom., 27
M. Amin (2001)
Toward self-healing energy infrastructure systemsIEEE Computer Applications in Power, 14
William Tolone, David Wilson, A. Raja, W. Xiang (2004)
Applying Cougaar to Integrated Critical Infrastructure Modeling and Simulation
E. Bagheri, A. Ghorbani (2006)
Towards an MDA-oriented UML profile for critical infrastructure modeling
M. Ulieru, Paul Worthington (2005)
Holonic risk management framework2005 IEEE International Conference on Systems, Man and Cybernetics, 1
W. Leontief (1967)
Input-output economics
S. Marsh, A. Ghorbani, V. Bhavsar (2003)
The ACORN multi-agent systemWeb Intell. Agent Syst., 1
S. Rinaldi, J. Peerenboom, T. Kelly (2001)
Identifying, understanding, and analyzing critical infrastructure interdependenciesIEEE Control Systems Magazine, 21
Guorui Zhang, A. Bose (1989)
Scenario Building for Operator Training Simulators Using a Transient Stability ProgramIEEE Power Engineering Review, 9
César Hidalgo, A. Barabási (2008)
Scale-free networksScholarpedia, 3
P. Donzelli, R. Setola (2007)
Identifying and evaluating risks related to enterprise dependencies: a practical goal-driven risk analysis frameworkInternational Journal of Risk Assessment and Management, 7
J. Turner, J. Hunsucker (1999)
Effective risk management: a goal based approachInternational Journal of Technology Management, 17
S. Wolthusen (2005)
GIS-based command and control infrastructure for critical infrastructure protectionFirst IEEE International Workshop on Critical Infrastructure Protection (IWCIP'05)
F. Nogales, J. Contreras, A. Conejo, R. Espínola (2002)
Forecasting Next-Day Electricity Prices by Time Series ModelsIEEE Power Engineering Review, 22
Y. Haimes, B. Horowitz, J. Lambert, J. Santos, C. Lian, K. Crowther (2005)
Inoperability Input-Output Model for Interdependent Infrastructure Sectors. I: Theory and MethodologyJournal of Infrastructure Systems, 11
I. Dobson, B. Carreras, D. Newman (2004)
A branching process approximation to cascading load-dependent system failure37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the
J. Aagedal, F. Braber, T. Dimitrakos, B. Gran, D. Raptis, K. Stølen (2002)
Model-based risk assessment to improve enterprise securityProceedings. Sixth International Enterprise Distributed Object Computing
Gilad Zlotkin, J. Rosenschein (1991)
Cooperation and conflict resolution via negotiation among autonomous agents in noncooperative domainsIEEE Trans. Syst. Man Cybern., 21
B. Ezell, J. Farr, I. Wiese (2000)
Infrastructure Risk Analysis ModelJournal of Infrastructure Systems, 6
Myriam Dunn (2005)
The socio-political dimensions of critical information infrastructure protection (CIIP)Int. J. Crit. Infrastructures, 1
E. Cenek (2000)
Review of: Modern Graph Theory by Béla BollobásSIGACT News, 31
R. Rubinstein (1981)
Simulation and the Monte Carlo method
E. Bagheri
A Service Oriented Approach to Critical Infrastructure Modeling
Xiaofan Wang, Guanrong Chen (2003)
Complex networks: small-world, scale-free and beyondIEEE Circuits and Systems Magazine, 3
S. Panzieri, R. Setola, G. Ulivi (2005)
AN APPROACH TO MODEL COMPLEX INTERDEPENDENT INFRASTRUCTURESIFAC Proceedings Volumes, 38
William Tolone, David Wilson, A. Raja, W. Xiang, Huili Hao, Stuart Phelps, E. Johnson (2004)
Critical Infrastructure Integration Modeling and Simulation
E. Bagheri, A. Ghorbani
Conceptualizing Critical Infrastructures as Service Oriented Complex Interdependent Systems
D. Barton, K. Stamber (2000)
An agent-based microsimulation of critical infrastructure systems
J. Marinero, C. Paredis, P. Khosla (1999)
Agent-based planning and control of a multi-manipulator assembly systemProceedings 1999 IEEE International Conference on Robotics and Automation (Cat. No.99CH36288C), 2
Y. Haimes, J. Lambert, Duan Li, R. Schooff, V. Tulsiani (1995)
Hierarchical holographic modeling for risk identification in complex systems1995 IEEE International Conference on Systems, Man and Cybernetics. Intelligent Systems for the 21st Century, 2
(2006)
Graphical (data visualization) eda techniques
P. Joskow, Edward Kahn (2001)
A Quantitative Analysis of Pricing Behavior in California's Wholesale Electricity Market During Summer 2000†The Energy Journal, 23
I. Dobson, B. Carreras, D. Newman (2004)
Probabilistic load-dependent cascading failure with limited component interactions2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512), 5
Y. Haimes (1981)
Hierarchical Holographic ModelingIEEE Transactions on Systems, Man, and Cybernetics, 11
N. Basu, R. Pryor, T. Quint (1996)
ASPEN: A Microsimulation Model of the EconomyComputational Economics, 12
Y. Haimes, B. Horowitz, J. Lambert, J. Santos, K. Crowther, C. Lian (2005)
Inoperability Input-Output Model for Interdependent Infrastructure Sectors. II: Case StudiesJournal of Infrastructure Systems, 11
S. Panzieri, R. Setola, G. Ulivi (2004)
An agent based simulator for critical interdependent infrastructures
I. Papazoglou (1998)
Mathematical Foundations of Event TreesQuality and Reliability Engineering International
David Frankel (2003)
Model Driven Architecture: Applying MDA to Enterprise Computing
Virginia Dignum (2000)
Towards a people-oriented knowledge management environmentProceedings 11th International Workshop on Database and Expert Systems Applications
S. Rinaldi (2004)
Modeling and simulating critical infrastructures and their interdependencies37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the
The protection of critical infrastructure systems has recently become a major concern for many countries. This is due to the effect of these systems on the daily lives of all citizens and the high possibility of disruption because of their complex structure and hidden interdependencies, which subsequently attract the attention of many researchers and scientists. The investigations of researchers have encompassed issues of national security, policymaking, infrastructure system organisation, and behaviour analysis and modelling. In this paper, we look into the latter subject and explore the attempts that have been made. Based on the available schemes and the requirements of this area, we propose a five-dimensional framework that introduces the major research necessities in this field. Among the various available schemes, we study ten of the most recently developed and/or influential systems. A comparison of these schemes based on the features of our proposed framework is made. The comparison allows us to conclude our examination with the identification of current research strengths and guidelines for future work.
International Journal of Critical Infrastructures – Inderscience Publishers
Published: Jan 1, 2008
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.