Academic literature on the topic 'Critical infrastructure systems (CISs)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Critical infrastructure systems (CISs).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Critical infrastructure systems (CISs)"

1

Constantinos, Heracleous, Kolios Panayiotis, G. Panayiotou Christos, Ellinas Georgios, and M. Polycarpou Marios. "Hybrid systems modeling for critical infrastructures interdependency analysis." Reliability Engineering & System Safety 165 (September 1, 2017): 89–101. https://doi.org/10.1016/j.ress.2017.03.028.

Full text
Abstract:
 Critical infrastructure systems (CISs) are large scale and complex systems, across which many interdependencies exist. As a result, several modeling and simulation approaches are being employed to study the concurrent operation of multiple CISs and their interdependencies. Complementary to existing literature, this work develops and implements a modeling and simulation framework based on open hybrid automata to analyze CISs interdependencies. With the proposed approach, it is possible to develop accurate models of infrastructure components, and interlink them together based on their depe
APA, Harvard, Vancouver, ISO, and other styles
2

Mottahedi, Adel, Farhang Sereshki, Mohammad Ataei, Ali Nouri Qarahasanlou, and Abbas Barabadi. "The Resilience of Critical Infrastructure Systems: A Systematic Literature Review." Energies 14, no. 6 (2021): 1571. http://dx.doi.org/10.3390/en14061571.

Full text
Abstract:
Risk management is a fundamental approach to improving critical infrastructure systems’ safety against disruptive events. This approach focuses on designing robust critical infrastructure systems (CISs) that could resist disruptive events by minimizing the possible events’ probability and consequences using preventive and protective programs. However, recent disasters like COVID-19 have shown that most CISs cannot stand against all potential disruptions. Recently there is a transition from robust design to resilience design of CISs, increasing the focus on preparedness, response, and recovery.
APA, Harvard, Vancouver, ISO, and other styles
3

Sarker, Partha, Bhushan Lohar, Sean Walker, Stephanie Patch, and John T. Wade. "Recovery Resiliency Characteristics of Interdependent Critical Infrastructures in Disaster-Prone Areas." Infrastructures 9, no. 11 (2024): 208. http://dx.doi.org/10.3390/infrastructures9110208.

Full text
Abstract:
When Hurricane Maria struck the island of Puerto Rico in September, 2017, it devastated the island’s critical infrastructures, including the well-documented total loss of electric power systems. The strong interdependencies or associations among critical infrastructures in modern society meant that the failure of power systems propagated to and exacerbated the failure of other infrastructure systems. Moreover, these associations impact systems recovery just as they impact system failure. This study is a follow-up of previous research by the first author on Hurricane Maria. In this research aut
APA, Harvard, Vancouver, ISO, and other styles
4

Espada, Rodolfo Jr, Armando Apan, and Kevin McDougall. "Vulnerability assessment and interdependency analysis of critical infrastructures for climate adaptation and flood mitigation." International Journal of Disaster Resilience in the Built Environment 6, no. 3 (2015): 313–46. http://dx.doi.org/10.1108/ijdrbe-02-2014-0019.

Full text
Abstract:
Purpose – The purpose of this paper is to present a novel approach that examines the vulnerability and interdependency of critical infrastructures using the network theory in geographic information system (GIS) setting in combination with literature and government reports. Specifically, the objectives of this study were to generate the network models of critical infrastructure systems (CISs), particularly electricity, roads and sewerage networks; to characterize the CISs’ interdependencies; and to outline the climate adaptation (CA) and flood mitigation measures of CIS. Design/methodology/appr
APA, Harvard, Vancouver, ISO, and other styles
5

Raman, Gauthama, and Aditya Mathur. "Fusing Design and Machine Learning for Anomaly Detection in Water Treatment Plants." Electronics 13, no. 12 (2024): 2267. http://dx.doi.org/10.3390/electronics13122267.

Full text
Abstract:
Accurate detection of process anomalies is crucial for maintaining reliable operations in critical infrastructures such as water treatment plants. Traditional methods for creating anomaly detection systems in these facilities typically focus on either design-based strategies, which encompass physical and engineering aspects, or on data-driven models that utilize machine learning to interpret complex data patterns. Challenges in creating these detectors arise from factors such as dynamic operating conditions, lack of design knowledge, and the complex interdependencies among heterogeneous compon
APA, Harvard, Vancouver, ISO, and other styles
6

Mao, Quan, and Yuechen Liu. "Post-Disaster Performance and Restoration Sequences of Interdependent Critical Infrastructure Systems Considering Various Socioeconomic Impacts." Sustainability 16, no. 15 (2024): 6609. http://dx.doi.org/10.3390/su16156609.

Full text
Abstract:
The failures of interdependent critical infrastructure systems (CISs) caused by disasters could result in significant impacts on the economy and society of cities. Although existing studies have proposed several socioeconomic impact indicators of CIS failures, using these indicators as optimization objectives of restoration sequences, most of them only selected one indicator and failed to reveal their differences. This study aims to analyze the differences between various socioeconomic impact indicators in evaluating post-disaster CIS performance and to identify their effects on the optimized
APA, Harvard, Vancouver, ISO, and other styles
7

Sun, Li, Haijiang Li, Joseph Nagel, and Siyao Yang. "Convergence of AI and Urban Emergency Responses: Emerging Pathway toward Resilient and Equitable Communities." Applied Sciences 14, no. 17 (2024): 7949. http://dx.doi.org/10.3390/app14177949.

Full text
Abstract:
Urban communities have long been pivotal in wealth creation and technological innovation. In the contemporary context, their modus operandi is intricately tied to a diverse array of critical infrastructure systems (CISs). These systems—encompassing utilities, transportation, communication, and more—are indispensable for daily life; however, historical lessons underscore that the ever-growing interdependence among modern CISs has sapped their robustness. Furthermore, this vulnerability is compounded by the intensifying natural hazards catalysed by climate change, leaving urban communities with
APA, Harvard, Vancouver, ISO, and other styles
8

Ramage, Xavier, Khutso Lebea, and Siphesihle Sithungu. "Cyber Warfare and Critical Infrastructure." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 566–75. https://doi.org/10.34190/eccws.24.1.3526.

Full text
Abstract:
This paper identifies the growing threat that cyber warfare poses to a country's Critical Infrastructure (CI) and the Critical Information Infrastructure (CII) that accompanies it. CI is a term that describes all of the essential systems and services needed for the nation to function. CII describes the Information Systems responsible for the CI's operation. This includes energy grids, finance, water supplies, transportation, and healthcare facilities. This paper will focus mainly on the CI related to energy grids and finance. With the growing integration of digital technologies into these sect
APA, Harvard, Vancouver, ISO, and other styles
9

Kulugh, Victor Emmanuel, Ageebee Silas Faki, and Egena Onu. "Theoretical Framework of Cybersecurity Resilience Maturity Assessment Model for Critical Information Infrastructure." Dutse Journal of Pure and Applied Sciences 11, no. 1b (2025): 75–85. https://doi.org/10.4314/dujopas.v11i1b.9.

Full text
Abstract:
Modern Societies depend heavily on Critical infrastructures (CIs) to thrive. The CI in turn is driven by critical information infrastructures (CIIs) which is a combination of information technology (IT) and operations technology (OT). However, the CIs are underpinned by the CIIs, thus, they (CIs) inherit the vulnerabilities of the CIIs and share the same threats as the CIIs. Failure of the CIIs driving the CIs will potentially lead to catastrophic consequences arising from cascaded, escalating and common cause effects against other dependent/ interdependent CIs/CIIs. Consequently, the CIIs sho
APA, Harvard, Vancouver, ISO, and other styles
10

Pervan, Graham. "How Chief Executive Officers in Large Organizations View the Management of their Information Systems." Journal of Information Technology 13, no. 2 (1998): 95–109. http://dx.doi.org/10.1177/026839629801300203.

Full text
Abstract:
As part of a research programme on key information systems (IS) management issues, a survey of Australasia's largest organizations was conducted to identify which issues were perceived by their chief executive officers (CEOs) as being important, problematic and critical over the next 3–5 years. The results reported are based on a moderate response rate (though perhaps reasonable for the target group) but formal testing showed an absence of non-response bias. The most critical issues were revealed to be a mix of technology management issues (managing and measuring the effectiveness of the infor
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Critical infrastructure systems (CISs)"

1

Shobeiri, Nejad Seyed Abdelhamid. "Modelling the Economic Impact of Extreme Events on Critical Infrastructure Systems in Australian Industries – Case Study in Finance and Tourism." Thesis, Griffith University, 2014. http://hdl.handle.net/10072/367136.

Full text
Abstract:
Economic and social stability across the world is tightly dependent on a sufficient and reliable flow of goods and services, based on the balance between supply and demand. The basis for the balance between supply and demand is a set of physical assets, processes and organisations that are collectively known as critical infrastructure systems (CIs). CIs are strongly interdependent in two complex ways: namely, physical and informational. Identification of CI interdependencies and interconnections is essential for the study of such supply and demand systems. Importantly, C
APA, Harvard, Vancouver, ISO, and other styles
2

Clarkson, Robert D. "Identity Verification Systems as a Critical Infrastructure." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/6777.

Full text
Abstract:
Identity management systems are essential to U.S. homeland and economic security. Systemic fragility has been exploited to facilitate terrorist travel and criminal evasion. The widespread dissemination and use of fraudulent identity documents exponentially complicates efforts to target terrorists and other persons who pose a threat to homeland security. Underage drinkers and illegal immigrants are common supporters and users of the fraudulent document industry. No single source can determine the net effect that these entities have in degrading identity system utility. Identity verification sys
APA, Harvard, Vancouver, ISO, and other styles
3

Kleppinger, David Lawrence. "Prioritized Reconfiguration of Interdependent Critical Infrastructure Systems." Diss., Virginia Tech, 2010. http://hdl.handle.net/10919/26916.

Full text
Abstract:
This dissertation contains an examination of the problem of reconfiguration for restoration in critical infrastructure systems, with regard for the prioritization of those systems and the relationships between them. The complexity of the reconfiguration problem is demonstrated, and previous efforts to present solutions to the problem are discussed. This work provides a number of methods by which reconfiguration for restoration of an arbitrary number of prioritized interdependent critical infrastructure systems can be achieved. A method of modeling systems called Graph Trace Analysis is use
APA, Harvard, Vancouver, ISO, and other styles
4

Dawson, Robert Edward. "Secure communications for critical infrastructure control systems." Thesis, Queensland University of Technology, 2008. https://eprints.qut.edu.au/20710/1/Robert_Dawson_Thesis.pdf.

Full text
Abstract:
In March 2000, 1 million litres of raw sewage was released into the water system of Maroochy Shire on Queensland’s sunshine coast. This environmental disaster was caused by a disgruntled ex-contractor using a radio transmitter to illicitly access the electronically controlled pumps in the control system. In 2007 CNN screened video footage of an experimental attack against a electrical generator. The attack caused the generator to shake and smoke, visually showing the damage caused by cyber attack. These attacks highlight the importance of securing the control systems which our critical infrast
APA, Harvard, Vancouver, ISO, and other styles
5

Dawson, Robert Edward. "Secure communications for critical infrastructure control systems." Queensland University of Technology, 2008. http://eprints.qut.edu.au/20710/.

Full text
Abstract:
In March 2000, 1 million litres of raw sewage was released into the water system of Maroochy Shire on Queensland’s sunshine coast. This environmental disaster was caused by a disgruntled ex-contractor using a radio transmitter to illicitly access the electronically controlled pumps in the control system. In 2007 CNN screened video footage of an experimental attack against a electrical generator. The attack caused the generator to shake and smoke, visually showing the damage caused by cyber attack. These attacks highlight the importance of securing the control systems which our critical infrast
APA, Harvard, Vancouver, ISO, and other styles
6

Schneider, Kevin Paul. "Analysis of critical infrastructure interactions /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/5990.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lane, Sean Theodore. "Vulnerability Analysis of Infrastructure Systems." BYU ScholarsArchive, 2020. https://scholarsarchive.byu.edu/etd/8614.

Full text
Abstract:
Complex cyber-physical systems have become fundamental to modern society by effectively providing critical services and improving efficiency in various domains. Unfortunately, as systems become more connected and more complex, they also can become more vulnerable and less robust. As a result, various failure modes become more common and easily triggered from both unanticipated and malicious perturbations. Research has been conducted in the area of vulnerability analysis for cyber-physical systems, to assist in locating these possible vulnerabilities before they can fail. I present two case st
APA, Harvard, Vancouver, ISO, and other styles
8

Chakravarthy, Rasika Mudumbai. "Long-lived authentication protocols for critical infrastructure process control systems." Pullman, Wash. : Washington State University, 2009. http://www.dissertations.wsu.edu/Thesis/Spring2009/r_mudumbai_chakravarthy_041509.pdf.

Full text
Abstract:
Thesis (M.S. in computer science )--Washington State University, May 2009.<br>Title from PDF title page (viewed on March 29, 2010). "School of Electrical Engineering and Computer Science." Includes bibliographical references (p. 112-115).
APA, Harvard, Vancouver, ISO, and other styles
9

Boutwell, Mark. "Exploring Industry Cybersecurity Strategy in Protecting Critical Infrastructure." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7965.

Full text
Abstract:
Successful attacks on critical infrastructure have increased in occurrence and sophistication. Many cybersecurity strategies incorporate conventional best practices but often do not consider organizational circumstances and nonstandard critical infrastructure protection needs. The purpose of this qualitative multiple case study was to explore cybersecurity strategies used by information technology (IT) managers and compliance officers to mitigate cyber threats to critical infrastructure. The population for this study comprised IT managers and compliance officers of 4 case organizations in the
APA, Harvard, Vancouver, ISO, and other styles
10

Lam, Juan Carlos. "Dynamic Analysis of Levee Infrastructure Failure Risk: A Framework for Enhanced Critical Infrastructure Management." Thesis, Virginia Tech, 2012. http://hdl.handle.net/10919/43106.

Full text
Abstract:
Current models that assess infrastructure failure risk are â linear,â and therefore, only consider the direct influence attributed to each factor that defines risk. These models do not consider the undeniable relationships that exist among these parameters. In reality, factors that define risk are interdependent and influence each other in a â non-linearâ fashion through feedback effects. Current infrastructure failure risk assessment models are also static, and do not allow infrastructure managers and decision makers to evaluate the impacts over time, especially the long-term impact of
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Critical infrastructure systems (CISs)"

1

Gopalakrishnan, Kasthurirangan, and Srinivas Peeta, eds. Sustainable and Resilient Critical Infrastructure Systems. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11405-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

United States. Department of Homeland Security. Office of Inspector General. Efforts to identify critical infrastructure assets and systems. Dept. of Homeland Security, Office of Inspector General, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kyriakides, Elias, and Marios Polycarpou, eds. Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-44160-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Institute for Defence Studies and Analyses, ed. Securing critical information infrastructure: Global perspectives and practices. Institute for Defence Studies & Analyses, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

M, Wrobel Sharon, ed. Disaster recovery planning for communications and critical infrastructure. Artech House, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

National Infrastructure Protection Center (U.S.). Risk management: An essential guide to protecting critical assets. National Infrastructure Protection Center, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

California. Legislature. Assembly. Committee on Information Technology. The year 2000 problem: Local government and critical infrastructure preparedness. The Committee, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

I, Atlas Randall, ed. 21st century security and CPTED: Designing for critical infrastructure protection and crime prevention. Taylor & Francis, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

T, Cogwell Mathew, ed. Critical infrastructures. Nova Science Publishers, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

National Research Council (U.S.). Toward Sustainable Critical Infrastructure Systems: Framing the Challenges Workshop Committee, ed. Sustainable critical infrastructure systems: A framework for meeting 21st century imperatives : report of a workshop. National Academies Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Critical infrastructure systems (CISs)"

1

Zolesio, Jean-Luc. "Critical Infrastructure Protection." In Systems of Systems. John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118557495.ch8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Evans, Nathaniel, and William Horsthemke. "Regional Critical Infrastructure." In Cyber Resilience of Systems and Networks. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-77492-3_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Young, Richard R., and Gary A. Gordon. "Critical Infrastructure: Transportation Systems." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-69891-5_85-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Young, Richard R., and Gary A. Gordon. "Critical Infrastructure: Transportation Systems." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-69891-5_85-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Young, Richard R., and Gary A. Gordon. "Critical Infrastructure: Transportation Systems." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_85-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Young, Richard R., and Gary A. Gordon. "Critical Infrastructure: Transportation Systems." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_85.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Raciti, Massimiliano, Jordi Cucurull, and Simin Nadjm-Tehrani. "Anomaly Detection in Water Management Systems." In Critical Infrastructure Protection. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28920-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bompard, Ettore, Paolo Cuccia, Marcelo Masera, and Igor Nai Fovino. "Cyber Vulnerability in Power Systems Operation and Control." In Critical Infrastructure Protection. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28920-0_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Giunta, Gabriele, Carmen Stira, Jolanda Modic, et al. "Improved Resilience of Critical Infrastructures Against Large-Scale Transnational and Systemic Risks." In Security Informatics and Law Enforcement. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62083-6_14.

Full text
Abstract:
AbstractThe integrity and resilience of Critical Infrastructures (CIs) are fundamental to the security, well-being and economic prosperity of Europe. However, the increasing complexity and interconnectedness of CIs pose new challenges, as disruptions in one CI can have cascading effects across multiple sectors and countries. ATLANTIS addresses these challenges by evaluating and addressing systemic risks against major natural hazards and complex attacks that could disrupt vital functions of European society. The project focuses on improving the resilience of interconnected CIs exposed to large-
APA, Harvard, Vancouver, ISO, and other styles
10

Ganguly, Auroop Ratan, Udit Bhatia, and Stephen E. Flynn. "Modeling Infrastructure Systems and Quantifying Resilience." In Critical Infrastructures Resilience. Routledge, 2018. http://dx.doi.org/10.4324/9781315153049-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Critical infrastructure systems (CISs)"

1

Bommareddy, Sahiti, Maher Khan, Huzaifah Nadeem, et al. "Tolerating Compound Threats in Critical Infrastructure Control Systems." In 2024 43rd International Symposium on Reliable Distributed Systems (SRDS). IEEE, 2024. https://doi.org/10.1109/srds64841.2024.00017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Thankappan, Manesh, Neetha K. Nataraj, Divya K S, Akshaya Jayaraj, Alen Joby, and Abhilash Asokan. "AI-Enabled Robotic Surveillance System for Critical Infrastructure." In 2025 Emerging Technologies for Intelligent Systems (ETIS). IEEE, 2025. https://doi.org/10.1109/etis64005.2025.10960891.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gujar, Shantanu Sudhir. "AI-Enhanced Intrusion Detection Systems for Strengthening Critical Infrastructure Security." In 2024 Global Conference on Communications and Information Technologies (GCCIT). IEEE, 2024. https://doi.org/10.1109/gccit63234.2024.10861950.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Aredo, Shenko Chura, Hailu Jelde Wedajo, Hailu Belay, and Kevin T. Kornegay. "Performance Analysis of 5G Enabled Mission Critical Push-to-Talk (MCPTT) Services for Secured Smart City." In 2025 59th Annual Conference on Information Sciences and Systems (CISS). IEEE, 2025. https://doi.org/10.1109/ciss64860.2025.10944702.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Erokhin, Sergey, Andrey Petukhov, Pavel Pilyugin, and Sergey Litvinyuk. "Asymptotic Information Security Management Formal Description for Critical Information Infrastructure." In 2024 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO). IEEE, 2024. http://dx.doi.org/10.1109/synchroinfo61835.2024.10617636.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hall-May, Martin, and Mike Surridge. "Resilient Critical Infrastructure Management Using Service Oriented Architecture." In 2010 International Conference on Complex, Intelligent and Software Intensive Systems (CISIS). IEEE, 2010. http://dx.doi.org/10.1109/cisis.2010.103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Piekert, Florian, Tim H Stelkens-kobsch, Hilke Boumann, Meilin Schaper, and Nils Carstengerdes. "Human Factors-Centric Validation of a Security Management System in a Linked Critical Infrastructures Environment." In 2025 Intelligent Human Systems Integration. AHFE International, 2025. https://doi.org/10.54941/ahfe1005846.

Full text
Abstract:
This work reports the human factors-related validation results of a security system for the protection of linked critical infrastructures (CIs) against combined cyber-physical attacks. Attacks of any kind on CIs have increased in number and complexity. In order to prevent or mitigate interruption of services to the public, the protection of CIs is of high importance. As an evolution of recent security research on single and linked CIs, the EU H2020 project PRAETORIAN adopted a holistic security management approach that addressed linked CIs with one overarching toolset.The PRAETORIAN toolset is
APA, Harvard, Vancouver, ISO, and other styles
8

Hayel, Yezekael, and Quanyan Zhu. "Resilient and secure network design for cyber attack-induced cascading link failures in critical infrastructures." In 2015 49th Annual Conference on Information Sciences and Systems (CISS). IEEE, 2015. http://dx.doi.org/10.1109/ciss.2015.7086855.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bucovetchi, Olga maria cristina, Dorel Badea, and Cristina petronela Simion. "BUSINESS CONTINUITY APPLIED TO EEDUCATION." In eLSE 2016. Carol I National Defence University Publishing House, 2016. http://dx.doi.org/10.12753/2066-026x-16-059.

Full text
Abstract:
In order to talk about performance management, one shall apply business continuity concepts that imply to forecast, understand, document, measure and transform a complex situation at a specific time in a highly depended environment. Business continuity within critical infrastructures (CI) sectors represent the core of a comfortable life in term of vital societal functions, health, safety, security, economic or social well-being of people (as stated Directive 114/2008). For a long period of time, critical infrastructure sector were assessed as an isolated system with no exchanges with the macro
APA, Harvard, Vancouver, ISO, and other styles
10

Grigalashvili, Vephkhvia, and Khatuna Abiashvili. "CONCEPTUAL REVIEW OF THE UNITED STATES CRITICAL INFRASTRUCTURE ARCHITECTURE: POLICY, LAW AND ADMINISTRATION." In Proceedings of the XXVIII International Scientific and Practical Conference. RS Global Sp. z O.O., 2021. http://dx.doi.org/10.31435/rsglobal_conf/25042021/7522.

Full text
Abstract:
The United States` Critical Infrastructure System (CIs) represents an umbrella concept grouping all those resources that are essential for national economic, financial, and social system. These critical infrastructures are vital and without them, or with any damages to them, would cripple the nation, states, and/or local communities and tribes. Based on a systematic review approach (methodology), this paper aims to review the United States’ Critical Infrastructure Protection System (USCIPS) at tree aspects. In section one, the policy pillars of USCIPS are outlined based on studding Presidentia
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Critical infrastructure systems (CISs)"

1

Sholander, Peter E., John L. Darby, James M. Phelan, et al. Critical infrastructure systems of systems assessment methodology. Sandia National Laboratories, 2006. http://dx.doi.org/10.2172/899076.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

BAKER, ARNOLD B., ROBERT L. HUTCHINSON, ROBERT J. EAGAN, et al. A Scalable Systems Approach for Critical Infrastructure Security. Office of Scientific and Technical Information (OSTI), 2002. http://dx.doi.org/10.2172/800793.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chavez, Adrian R., Mitchell Tyler Martin, Jason Hamlet, William M. S. Stout, and Erik Lee. Network Randomization and Dynamic Defense for Critical Infrastructure Systems. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1179040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Koepke, Galen H., William F. Young, John M. Ladbury, and Jason B. Coder. Interference and Coexistence of Wireless Systems in Critical Infrastructure. National Institute of Standards and Technology, 2015. http://dx.doi.org/10.6028/nist.tn.1885.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Klatt, C., and R. Ghoddousi-Fard. Global navigation satellite systems: critical infrastructure sensitive to the Earth's ionosphere. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2015. http://dx.doi.org/10.4095/296405.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lombardi, Michael A. An Evaluation of Dependencies of Critical Infrastructure Timing Systems on the Global Positioning System (GPS). National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.tn.2189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Callaghan, Caitlin, Danielle Peterson, Timothy Cooke, Brandon Booker, and Kathryn Trubac. Installation resilience in cold regions using energy storage systems. Engineer Research and Development Center (U.S.), 2021. http://dx.doi.org/10.21079/11681/42200.

Full text
Abstract:
Electrical energy storage (EES) has emerged as a key enabler for access to electricity in remote environments and in those environments where other external factors challenge access to reliable electricity. In cold climates, energy storage technologies face challenging conditions that can inhibit their performance and utility to provide electricity. Use of available energy storage technologies has the potential to improve Army installation resilience by providing more consistent and reliable power to critical infrastructure and, potentially, to broader infrastructure and operations. Sustainabl
APA, Harvard, Vancouver, ISO, and other styles
8

Callaghan, Caitlin, Danielle Peterson, Timothy Cooke, Brandon Booker, and Kathryn Trubac. Installation resilience in cold regions using energy storage systems. Engineer Research and Development Center (U.S.), 2021. http://dx.doi.org/10.21079/11681/42200.

Full text
Abstract:
Electrical energy storage (EES) has emerged as a key enabler for access to electricity in remote environments and in those environments where other external factors challenge access to reliable electricity. In cold climates, energy storage technologies face challenging conditions that can inhibit their performance and utility to provide electricity. Use of available energy storage technologies has the potential to improve Army installation resilience by providing more consistent and reliable power to critical infrastructure and, potentially, to broader infrastructure and operations. Sustainabl
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Joseph, and Jose Arroyo-Turcios. Conceptual Critical Success Factors Model on Infrastructure Sustainability Rating System for California Construction Projects. Mineta Transportation Institute, 2025. https://doi.org/10.31979/mti.2024.2324.

Full text
Abstract:
This report addresses the sensitivity and reliability of the sustainability rating systems by comparing each category’s verified scores with its respective submitted scores to evaluate how points are awarded for infrastructure projects, examine which categories present the most challenges for verification, and identify the best category for verification in the sustainability rating system. The authors conducted three analyses using credit score data obtained from fourteen actual civil infrastructure projects certified under Envision. First, the Natural World category had the highest average sc
APA, Harvard, Vancouver, ISO, and other styles
10

Ragavan, K. V. Santhosh, Aromar Revi, Srinithi Sudhakar, Mahima Vijendra, P. P. Vimala, and Kavita Wankhade. Transitioning Urban Water and Sanitation Systems: Key Elements for Sustainable Change. Indian Institute for Human Settlements; Global Commission for the Economics of Water, 2024. http://dx.doi.org/10.24943/9788198256829.

Full text
Abstract:
Significant gaps and inequities in urban water and sanitation services persist, with a growing risk of exacerbation due to changes in the climate, global water cycle, and patterns of urbanisation. Urban water and sanitation systems need to transition to accelerate access to safe, equitable, and sustainable water and sanitation services, while enhancing resilience to respond to increasing risks. This paper reviews the persistent challenges in water and sanitation services, emerging risks from climate change, and imbalances in the global water cycle that threaten to impact urban water cycles, an
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!