Academic literature on the topic 'Critical Infrastructure Protection (CIP)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Critical Infrastructure Protection (CIP).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Critical Infrastructure Protection (CIP)"

1

Tabansky, L. "Critical Infrastructure Protection." International Journal of Cyber Warfare and Terrorism 3, no. 3 (2013): 80–87. http://dx.doi.org/10.4018/ijcwt.2013070106.

Full text
Abstract:
Cyber Warfare holds a grave hazard of striking national infrastructure while circumventing traditional defense systems. This article examines the evolution of Critical Infrastructure Protection (CIP) policy in Israel and analyses its performance. Israel has developed a unique legal and regulatory model for critical infrastructure protection, which was implemented in late 2002. Recently, a comprehensive review of cyber security posture has been conducted, and significant policy changes are in progress. The Israeli approach to CIP and beyond, fostering cooperation between public, security, acade
APA, Harvard, Vancouver, ISO, and other styles
2

Brem, Stefan. "Critical Infrastructure Protection from a National Perspective." European Journal of Risk Regulation 6, no. 2 (2015): 191–99. http://dx.doi.org/10.1017/s1867299x00004499.

Full text
Abstract:
This article addresses conceptional components of national strategies on critical infrastructure protection (CIP). In particular, it focuses on the Swiss CIP programme and its strategic components. As in other countries, Switzerland divides its national infrastructure into critical sectors, but rather distinctively it subdivides them into critical subsectors and even lists specific critical infrastructure objects in a classified inventory. The article stresses the importance of a pragmatic public private partnership in further strengthening the CI's resiliency, but also argues for a more expli
APA, Harvard, Vancouver, ISO, and other styles
3

Trifunović, Darko. "Elements of Critical Infrastructure Resilience." National security and the future 20, no. 1-2 (2020): 51–61. http://dx.doi.org/10.37458/nstf.20.1-2.6.

Full text
Abstract:
This Article points to key elements of Critical Infrastructure Resilience (CIR) and how they differ from Critical Infrastructure Protection (CIP). CIP is still very important and one of the key systems that the society relies upon to ensure the continuity of operation of CI. However, CIP cannot predict an adequate number of major threats that would allow to conduct the preparedness and response at the level which would ensure the sufficient operation of CI in all cases. In that sense CIR sets a new paradigm with a quality that reduces vulnerability, minimizes the consequences of threats, accel
APA, Harvard, Vancouver, ISO, and other styles
4

Schmitz, W. "Simulation and test: Instruments for Critical Infrastructure Protection (CIP)." Information Security Technical Report 12, no. 1 (2007): 2–15. http://dx.doi.org/10.1016/j.istr.2007.02.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Große, Christine, Pär M. Olausson, and Susanne Wallman-Lundåsen. "Left in the Dark: Obstacles to Studying and Performing Critical Infrastructure Protection." Electronic Journal of Business Research Methods 19, no. 2 (2021): pp58–70. http://dx.doi.org/10.34190/ejbrm.19.2.2509.

Full text
Abstract:
This paper highlights major methodological obstacles to studying and performing critical infrastructure protection (CIP) in general and CIP governance in particular. The study simultaneously examines a research project on and practice in the context of Swedish CIP. The complex planning approach of interest is called Styrel, a Swedish acronym for Steering Electricity to prioritised power consumers. It aims to identify and prioritise power consumers of societal importance, collectively referred to as critical infrastructure (CI), to provide an emergency response plan for the event of a national
APA, Harvard, Vancouver, ISO, and other styles
6

Yigit, Yagmur, Mohamed Amine Ferrag, Mohamed C. Ghanem, et al. "Generative AI and LLMs for Critical Infrastructure Protection: Evaluation Benchmarks, Agentic AI, Challenges, and Opportunities." Sensors 25, no. 6 (2025): 1666. https://doi.org/10.3390/s25061666.

Full text
Abstract:
Critical National Infrastructures (CNIs)—including energy grids, water systems, transportation networks, and communication frameworks—are essential to modern society yet face escalating cybersecurity threats. This review paper comprehensively analyzes AI-driven approaches for Critical Infrastructure Protection (CIP). We begin by examining the reliability of CNIs and introduce established benchmarks for evaluating Large Language Models (LLMs) within cybersecurity contexts. Next, we explore core cybersecurity issues, focusing on trust, privacy, resilience, and securability in these vital systems
APA, Harvard, Vancouver, ISO, and other styles
7

Wiater, Patricia. "On the notion of “Partnership” in Critical Infrastructure Protection." European Journal of Risk Regulation 6, no. 2 (2015): 255–62. http://dx.doi.org/10.1017/s1867299x00004554.

Full text
Abstract:
This article is a critical reflection on the manifoldness of the notion of “partnership” in Critical Infrastructure Protection. It is argued that the partnership arrangement can be a promising political approach to CIP if the details of public-private cooperation – that is: the participants, the duration, the responsibilities and duties, as well as possible financial compensation – are formalized. Illusionary ideas of a “partner-like” relationship between the public and the private, such as those laid down in the German “National Strategy for Critical Infrastructure Protection”, are, however,
APA, Harvard, Vancouver, ISO, and other styles
8

Mohammed, Amir, Fasil Muddeen, Lincoln Marine, and Craig J. Ramlal. "The Exigency for Resilient and Cyber-Secure Critical Infrastructure in the Caribbean." West Indian Journal of Engineering 45, no. 2 (2023): 35–49. http://dx.doi.org/10.47412/deox2766.

Full text
Abstract:
Critical Infrastructures (CIs) are essential assets used to maintain vital societal functions, for example utilities such as power, water, gas, and telecommunication networks. CIs comprise two main parts, namely a: Cyber component and a Physical component, which allow them to operate. Therefore, the occurrence of faults or attacks in either domain can result in the disruption of services, causing negative impacts beyond the system itself. The purpose of this article is to raise awareness within Trinidad and Tobago and, by extension, the Caribbean on the importance of maintaining resilient and
APA, Harvard, Vancouver, ISO, and other styles
9

Nwizu, Udoka Ngozi. "Securing America’s Critical Infrastructure: Strengthening Compliance with NERC Cybersecurity Standards." Journal of Technology and Systems 7, no. 2 (2025): 33–47. https://doi.org/10.47941/jts.2636.

Full text
Abstract:
Purpose: Critical infrastructure, including energy, transportation, and water systems, is increasingly vulnerable to cyber threats and physical attacks. This paper examines the current state of America’s critical infrastructure security, focusing on the challenges posed by sophisticated cyberattacks, aging infrastructure, and regulatory compliance. The study evaluates the effectiveness of existing security frameworks, including the North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) standards, and highlights gaps in their implementation. Methodology:
APA, Harvard, Vancouver, ISO, and other styles
10

Schweizer, Rainer J. "State Duties to Protect." European Journal of Risk Regulation 6, no. 2 (2015): 219–28. http://dx.doi.org/10.1017/s1867299x00004529.

Full text
Abstract:
Most European countries’ constitutional obligations guarantee and protect public security and fundamental rights. One aspect and often a prerequisite for the protection of public security and individual rights is the protection of critical infrastructure (CIP). CIP is of great importance in Switzerland, which is inevitable in an economically and technologically sophisticated and densely populated country.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Critical Infrastructure Protection (CIP)"

1

Perito, Daniele. "Exécution sécurisée de code sur systèmes embarqués." Phd thesis, Université de Grenoble, 2011. http://tel.archives-ouvertes.fr/tel-00639053.

Full text
Abstract:
Les systèmes embarqués sont utilisés dans de nombreux systèmes critiques, depuis les automobiles jusqu'aux les systèmes de contrôle industriels. La plupart des recherches sur ces systèmes embarqués se sont concentrés sur l'amélioration de leur fiabilité face à des fautes ou erreurs de fonctionnent non intentionnelles, moins de travaux on été réalisés considérant les attaques intentionnelles. Ces systèmes embarqués sont de plus en plus connectés, souvent à Internet, via des réseaux sans fils, par exemple pour leur administration à distance. Cela augmente les risques d'attaques à distance ou d'i
APA, Harvard, Vancouver, ISO, and other styles
2

Shwani, Hazim G. "Critical infrastructure protection." Thesis, Utica College, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1555605.

Full text
Abstract:
<p> This research study focused on identifying the protection of critical infrastructures and enhancing cybersecurity. The most recent cyber practice that is in place to protect critical infrastructures was also explored. From the literature review, it was concluded there are security loopholes in critical infrastructures. The study also uncovered that the federal government uses the newest cybersecurity tools, but does not share cyber vulnerabilities and risks with the private sector operating the infrastructures. The study also included an in-depth examination of Congressional document
APA, Harvard, Vancouver, ISO, and other styles
3

Betts, Jennifer Ann. "Ethics, national security, and critical infrastructure protection." Thesis, Queen's University Belfast, 2015. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.695222.

Full text
Abstract:
This is an inter-disciplinary thesis that uses social science methodology to examine the impact of ethics, privacy and trust in areas as apparently diverse as online advertising, national security surveillance measures, and the protection of critical infrastructures. The issues examined range from behavioural advertising to the public reaction to revelations of mass data surveillance by government security agencies. Academic research on privacy and the threat to users posed by vast amounts of personal information available online is summarised, along with challenges this poses for legislators.
APA, Harvard, Vancouver, ISO, and other styles
4

McQuinn, Matthew E. "Energy regulation effects on critical infrastructure protection." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Dec/08Dec%5FMcQuinn.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, December 2008.<br>Thesis Advisor(s): Lewis, Theodore G. "December 2008." Description based on title screen as viewed on January 30, 2009. Includes bibliographical references (p. 71-76). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
5

Jaksec, Gregory M. "Public-private-defense partnering in critical infrastructure protection." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FJaksec.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2006.<br>Thesis Advisor(s): Ted Lewis. "March 2006." Includes bibliographical references (p.41-45). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
6

Gottschalk, Jason Howard. "Towards an evaluation and protection strategy for critical infrastructure." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1018793.

Full text
Abstract:
Critical Infrastructure is often overlooked from an Information Security perspective as being of high importance to protect which may result in Critical Infrastructure being at risk to Cyber related attacks with potential dire consequences. Furthermore, what is considered Critical Infrastructure is often a complex discussion, with varying opinions across audiences. Traditional Critical Infrastructure included power stations, water, sewage pump stations, gas pipe lines, power grids and a new entrant, the “internet of things”. This list is not complete and a constant challenge exists in identify
APA, Harvard, Vancouver, ISO, and other styles
7

Martinez, Tiburcio Felix. "Maritime protection of critical infrastructure assets in the Campeche Sound." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Dec%5FMartinez%5FTiburcio.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Stouten, Floris. "Big data analytics attack detection for Critical Information Infrastructure Protection." Thesis, Luleå tekniska universitet, Datavetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-59562.

Full text
Abstract:
Attacks on critical information infrastructure are increasing in volume and sophistication with destructive consequences according to the 2015 Cyber Supply Chain Security Revisited report from ESG recently (ESG, 2015). In a world of connectivity and data dependency, cyber-crime is on the rise causing many disruptions in our way of living. Our society relies on these critical information infrastructures for our social and economic well-being, and become more complex due to many integrated systems. Over the past years, various research contributions have been made to provide intrusion detection
APA, Harvard, Vancouver, ISO, and other styles
9

Young, Charles P. "Method or madness federal oversight structures for critical infrastructure protection." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FYoung.pdf.

Full text
Abstract:
Thesis (M.A. in National Security Studies (Homeland Defense and Security))--Naval Postgraduate School, December 2007.<br>Thesis Advisor(s): Lawson, Letitia ; Zolin, Roxanne. "December 2007." Description based on title screen as viewed on January 25, 2008. Includes bibliographical references (p. 55-60). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
10

Snyder, Mark E. "Critical infrastructure protection and the Domain Name Service (DNS) system." Diss., Rolla, Mo. : Missouri University of Science and Technology, 2008. http://scholarsmine.mst.edu/thesis/pdf/Snyder_09007dcc805e0f32.pdf.

Full text
Abstract:
Thesis (M.S.)--Missouri University of Science and Technology, 2008.<br>Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed January 15, 2009) Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Critical Infrastructure Protection (CIP)"

1

United States. Government Accountability Office., ed. Critical infrastructure protection. Nova Science, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Goetz, Eric, and Sujeet Shenoi, eds. Critical Infrastructure Protection. Springer US, 2007. http://dx.doi.org/10.1007/978-0-387-75462-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lopez, Javier, Roberto Setola, and Stephen D. Wolthusen, eds. Critical Infrastructure Protection. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28920-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sujeet, Shenoi, and SpringerLink (Online service), eds. Critical Infrastructure Protection. International Federation for Information Processin, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Staggs, Jason, and Sujeet Shenoi, eds. Critical Infrastructure Protection XV. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93511-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nádai, László, and József Padányi, eds. Critical Infrastructure Protection Research. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-28091-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Staggs, Jason, and Sujeet Shenoi, eds. Critical Infrastructure Protection XIII. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34647-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Staggs, Jason, and Sujeet Shenoi, eds. Critical Infrastructure Protection XIV. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62840-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Staggs, Jason, and Sujeet Shenoi, eds. Critical Infrastructure Protection XII. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04537-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rice, Mason, and Sujeet Shenoi, eds. Critical Infrastructure Protection X. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-48737-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Critical Infrastructure Protection (CIP)"

1

Lazari, Alessandro. "State of Play of CIP in the EU After the Directive 114/08." In European Critical Infrastructure Protection. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07497-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lazari, Alessandro. "A Brief Chronicle of CIP Main Events in the USA Before and After September 11, 2001." In European Critical Infrastructure Protection. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07497-9_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dunn Cavelty, Myriam, and Manuel Suter. "The Art of CIIP Strategy: Tacking Stock of Content and Processes." In Critical Infrastructure Protection. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28920-0_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gugliandolo, Emilia, John Soldatos, and Habtamu Abie. "EU-CIP: European Knowledge Hub and Policy Testbed for Critical Infrastructure Protection." In Security Informatics and Law Enforcement. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62083-6_42.

Full text
Abstract:
AbstractIn our interconnected world, critical infrastructure systems are essential for modern societies. However, they face increasing threats, from cyberattacks to natural disasters. To address these challenges, the EU-CIP (Critical Infrastructure Protection) mission, a 3-year Coordination and Support Action funded by the European Commission, was initiated in October 2022. This chapter presents preliminary findings from the EU-CIP-ANALYSIS activities, shedding light on the evolving landscape of critical infrastructure protection. Preliminary findings reveal key needs, including adaptability,
APA, Harvard, Vancouver, ISO, and other styles
5

Lazari, Alessandro. "The Next Decade of European CIP: Anxiety of Decision, Fear of the Future, Perception of Risk As Well As Attempting to Answer the Question: “Which of the CIP’s Elements Will Most Affect Critical Infrastructure Protection?”." In European Critical Infrastructure Protection. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07497-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tabansky, Lior, and Isaac Ben Israel. "The Israeli National Cybersecurity Policy Focuses on Critical Infrastructure Protection (CIP)." In Cybersecurity in Israel. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18986-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lepofsky, Ron. "North American Energy Council Security Standard for Critical Infrastructure Protection (NERC CIP)." In The Manager’s Guide to Web Application Security:. Apress, 2014. http://dx.doi.org/10.1007/978-1-4842-0148-0_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bologna, Sandro, Giovanni Di Costanzo, Eric Luiijf, and Roberto Setola. "An Overview of R&D Activities in Europe on Critical Information Infrastructure Protection (CIIP)." In Critical Information Infrastructures Security. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11962977_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ding, Sophia. "Secure Payment." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_32.

Full text
Abstract:
AbstractSecure payment is an essential element of digital commerce in a world where cash is becoming redundant, credit cards are becoming less and less critical, and mobile devices are becoming means of payment. Therefore, it must be considered through the lens of various payment methods: Credit cards have been around since the 1950s, but the introduction of chip technology and contactless payment raises new challenges for the security of payments. Commercial payment service providers, such as credit card issuers or infrastructure operators, typically implement secure payment. Additionally, th
APA, Harvard, Vancouver, ISO, and other styles
10

von Solms, Basie, and Elmarie Kritzinger. "Critical Information Infrastructure Protection (CIIP) and Cyber Security in Africa – Has the CIIP and Cyber Security Rubicon Been Crossed?" In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29093-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Critical Infrastructure Protection (CIP)"

1

Adilzhanova, Saltanat, Aigerim Rakhysh, Gulshat Amirkanova, Gulnur Tyulepberdinova, Murat Kunelbayev, and Bakytgul Ilessova. "Improving Critical Infrastructure Protection: Assessment Methods, AI, Digital Twins." In 2024 7th Asia Conference on Cognitive Engineering and Intelligent lnteraction (CEII). IEEE, 2024. https://doi.org/10.1109/ceii65291.2024.00033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Haider, Raja Zeeshan, Baber Aslam, Haider Abbas, and Muhammad Qasim. "Reinforcing Cyber Digital Twins for Protecting Critical Information Infrastructure (CII): Opportunities and Challenges." In 2024 International Conference on IT and Industrial Technologies (ICIT). IEEE, 2024. https://doi.org/10.1109/icit63607.2024.10860015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Marut, Adam, Przemysław Wojciechowski, Konrad Wojtowicz, Jakub Djabin, Jakub Kochan, and Maciej Kurenda. "Surveillance and protection of critical infrastructure with Unmanned Aerial Vehicles." In 2024 IEEE International Workshop on Technologies for Defense and Security (TechDefense). IEEE, 2024. https://doi.org/10.1109/techdefense63521.2024.10863159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tibbals, Tim, and David Dolezilek. "Communications Technologies and Practices to Satisfy NERC Critical Infrastructure Protection (CIP)." In 2006 Power Systems Advanced Metering, Protection, Control, Communication, and Distributed Resources. IEEE, 2006. http://dx.doi.org/10.1109/psamp.2006.285415.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Johnson, C. W., and K. McLean. "Tools for local critical infrastructure protection: computational support for identifying safety and security interdependencies between local critical infrastructures." In 3rd IET International Conference on System Safety 2008. IEE, 2008. http://dx.doi.org/10.1049/cp:20080736.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Goodger, A. C., J. T. Knowles, and N. H. M. Caldwell. "What does the assurance case approach deliver for critical information infrastructure protection in cybersecurity?" In 7th IET International Conference on System Safety, incorporating the Cyber Security Conference 2012. Institution of Engineering and Technology, 2012. http://dx.doi.org/10.1049/cp.2012.1501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ani, U. D., J. D. McK Watson, J. R. C. Nurse, A. Cook, and C. Maples. "A review of critical infrastructure protection approaches: improving security through responsiveness to the dynamic modelling landscape." In Living in the Internet of Things (IoT 2019). Institution of Engineering and Technology, 2019. http://dx.doi.org/10.1049/cp.2019.0131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ransom, Daniel L. "Critical Infrastructure Protection With Modern Protection Relays." In 2023 IEEE IAS Petroleum and Chemical Industry Technical Conference (PCIC). IEEE, 2023. http://dx.doi.org/10.1109/pcic43643.2023.10414317.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jones, E. V., V. J. Lyford, M. K. Qazi, N. J. Solan, and Y. Y. Haimes. "Virgina's critical infrastructure protection study." In Proceedings of the 2003 IEEE Systems and Information Engineering Design Symposium. IEEE, 2003. http://dx.doi.org/10.1109/sieds.2003.158021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zezulova, Eva, Pavel Maňas, and Klara Cibulova. "Population Protection and Protection of Critical Infrastructure Elements." In 2023 International Conference on Military Technologies (ICMT). IEEE, 2023. http://dx.doi.org/10.1109/icmt58149.2023.10171303.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Critical Infrastructure Protection (CIP)"

1

García Zaballos, Antonio, and Inkyung Jeun. Best Practices for Critical Information Infrastructure Protection (CIIP): Experiences from Latin America and the Caribbean and Selected Countries. Inter-American Development Bank, 2016. http://dx.doi.org/10.18235/0000393.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tomko, John S., and Jr. Critical Infrastructure Protection. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada401004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

John, Miriam, and Ronald Kerber. Critical Homeland Infrastructure Protection. Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada464666.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Keliiaa, Curtis M. National-Tribal Critical Infrastructure Protection Collaborative. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1631216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Singh, Bismark, and Jean-Paul Watson. Chance-Constrained Optimization for Critical Infrastructure Protection. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1474266.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bofman, Ryan K. Critical Infrastructure Protection- Los Alamos National Laboratory. Office of Scientific and Technical Information (OSTI), 2017. http://dx.doi.org/10.2172/1345142.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cybenko, George. Critical Infrastructure Protection and Information Assurance Fellowship Program. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada429184.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ellis, James, David Fisher, Thomas Longstaff, Linda Pesante, and Richard Pethia. Report to the President's Commission on Critical Infrastructure Protection. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada324232.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Peter P. Critical Infrastructure Protection and Information Assurance (CIPIA) Fellow Program. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada422199.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tussing, Bert, Kenneth Butts, and John Traylor. Collins Center Senior Symposium: Examining Critical Infrastructure Protection Strategies. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada425909.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!