Journal articles on the topic 'Critical infrastructure systems (CISs)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Critical infrastructure systems (CISs).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Constantinos, Heracleous, Kolios Panayiotis, G. Panayiotou Christos, Ellinas Georgios, and M. Polycarpou Marios. "Hybrid systems modeling for critical infrastructures interdependency analysis." Reliability Engineering & System Safety 165 (September 1, 2017): 89–101. https://doi.org/10.1016/j.ress.2017.03.028.
Full textMottahedi, Adel, Farhang Sereshki, Mohammad Ataei, Ali Nouri Qarahasanlou, and Abbas Barabadi. "The Resilience of Critical Infrastructure Systems: A Systematic Literature Review." Energies 14, no. 6 (2021): 1571. http://dx.doi.org/10.3390/en14061571.
Full textSarker, Partha, Bhushan Lohar, Sean Walker, Stephanie Patch, and John T. Wade. "Recovery Resiliency Characteristics of Interdependent Critical Infrastructures in Disaster-Prone Areas." Infrastructures 9, no. 11 (2024): 208. http://dx.doi.org/10.3390/infrastructures9110208.
Full textEspada, Rodolfo Jr, Armando Apan, and Kevin McDougall. "Vulnerability assessment and interdependency analysis of critical infrastructures for climate adaptation and flood mitigation." International Journal of Disaster Resilience in the Built Environment 6, no. 3 (2015): 313–46. http://dx.doi.org/10.1108/ijdrbe-02-2014-0019.
Full textRaman, Gauthama, and Aditya Mathur. "Fusing Design and Machine Learning for Anomaly Detection in Water Treatment Plants." Electronics 13, no. 12 (2024): 2267. http://dx.doi.org/10.3390/electronics13122267.
Full textMao, Quan, and Yuechen Liu. "Post-Disaster Performance and Restoration Sequences of Interdependent Critical Infrastructure Systems Considering Various Socioeconomic Impacts." Sustainability 16, no. 15 (2024): 6609. http://dx.doi.org/10.3390/su16156609.
Full textSun, Li, Haijiang Li, Joseph Nagel, and Siyao Yang. "Convergence of AI and Urban Emergency Responses: Emerging Pathway toward Resilient and Equitable Communities." Applied Sciences 14, no. 17 (2024): 7949. http://dx.doi.org/10.3390/app14177949.
Full textRamage, Xavier, Khutso Lebea, and Siphesihle Sithungu. "Cyber Warfare and Critical Infrastructure." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 566–75. https://doi.org/10.34190/eccws.24.1.3526.
Full textKulugh, Victor Emmanuel, Ageebee Silas Faki, and Egena Onu. "Theoretical Framework of Cybersecurity Resilience Maturity Assessment Model for Critical Information Infrastructure." Dutse Journal of Pure and Applied Sciences 11, no. 1b (2025): 75–85. https://doi.org/10.4314/dujopas.v11i1b.9.
Full textPervan, Graham. "How Chief Executive Officers in Large Organizations View the Management of their Information Systems." Journal of Information Technology 13, no. 2 (1998): 95–109. http://dx.doi.org/10.1177/026839629801300203.
Full textYevseiev, Serhii, Yevgen Melenti, Oleksandr Voitko, et al. "Development of a concept for building a critical infrastructure facilities security system." Eastern-European Journal of Enterprise Technologies 3, no. 9(111) (2021): 63–83. http://dx.doi.org/10.15587/1729-4061.2021.233533.
Full textSerhii, Yevseiev, Melenti Yevgen, Voitko Oleksandr, et al. "Development of a concept for building a critical infrastructure facilities security system." Eastern-European Journal of Enterprise Technologies 3, no. 9 (111) (2021): 63–83. https://doi.org/10.15587/1729-4061.2021.233533.
Full textAdebonojo, Anthony A., Kirk A. Moen, and Jennifer L. Russell. "MBSE Analysis & Update of U.S. Infrastructure Data Taxonomy (IDT) Using U.S. National Critical Functions (NCFs)." INCOSE International Symposium 34, no. 1 (2024): 2048–68. http://dx.doi.org/10.1002/iis2.13255.
Full textCarroll, Jami. "The U.S. National Cybersecurity Strategy: A Vehicle with an International Journey." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 107–15. http://dx.doi.org/10.34190/eccws.23.1.2300.
Full textBukunmi Temiloluwa Ofili, Emmanuella Osaruwenese Erhabor, and Oghogho Timothy Obasuyi. "Enhancing federal cloud security with AI: Zero trust, threat intelligence and CISA Compliance." World Journal of Advanced Research and Reviews 25, no. 2 (2025): 2377–400. https://doi.org/10.30574/wjarr.2025.25.2.0620.
Full textCallcut, Matthew, Jean-Paul Cerceau Agliozzo, Liz Varga, and Lauren McMillan. "Digital Twins in Civil Infrastructure Systems." Sustainability 13, no. 20 (2021): 11549. http://dx.doi.org/10.3390/su132011549.
Full textMykhaylovskyi, Denys, Ihor Skliarov, and Oleh Komar. "Comparison of methods for calculating the parameters of an explosion shock wave for the design of protective engineering structures." Building constructions. Theory and Practice, no. 16 (June 28, 2025): 110–22. https://doi.org/10.32347/2522-4182.16.2025.110-122.
Full textMa, Jiajun, Guohua Chen, Tao Zeng, Lixing Zhou, Jie Zhao, and Yuanfei Zhao. "Methodology for Resilience Assessment of Oil Pipeline Network System Exposed to Earthquake." Sustainability 15, no. 2 (2023): 972. http://dx.doi.org/10.3390/su15020972.
Full textNafisat Zajime Bako, Chidiebube Nelson Ozioko, Ismail Oluwasola Sanni, and Olumide Oni. "The Integration of AI and blockchain technologies for secure data management in cybersecurity." World Journal of Advanced Research and Reviews 25, no. 3 (2025): 1666–97. https://doi.org/10.30574/wjarr.2025.25.3.0784.
Full textOyekunle, Seun Michael, Olufisayo Juliana Tiwo, Temilade Oluwatoyin Adesokan-Imran, Adekunbi Justina Ajayi, Ademola Oluwaseun Salako, and Oluwaseun Oladeji Olaniyi. "Enhancing Data Resilience in Cloud-based Electronics Health Records through Ransomware Mitigation Strategies Using NIST and MITRE ATT&CK Frameworks." Journal of Engineering Research and Reports 27, no. 3 (2025): 436–57. https://doi.org/10.9734/jerr/2025/v27i31444.
Full textSchweitzer, M., and A. Hoerbst. "A Systematic Investigation on Barriers and Critical Success Factors for Clinical Information Systems in Integrated Care Settings." Yearbook of Medical Informatics 24, no. 01 (2015): 79–89. http://dx.doi.org/10.15265/iy-2015-018.
Full textPye, Graeme. "Critical Infrastructure Systems." International Journal of Cyber Warfare and Terrorism 1, no. 3 (2011): 37–58. http://dx.doi.org/10.4018/ijcwt.2011070103.
Full textWright, Blake. "Cybersecurity: The Forever Problem." Journal of Petroleum Technology 73, no. 07 (2021): 26–29. http://dx.doi.org/10.2118/0721-0026-jpt.
Full textKalogeraki, Eleni-Maria, Spyridon Papastergiou, and Themis Panayiotopoulos. "An Attack Simulation and Evidence Chains Generation Model for Critical Information Infrastructures." Electronics 11, no. 3 (2022): 404. http://dx.doi.org/10.3390/electronics11030404.
Full textZangiev, Taimuraz, Elizar Tarasov, Vladimir Sotnikov, Zalina Tugusheva, and Fatima Gunay. "About One Approach to the Selection of Information Protection Facilities." NBI Technologies, no. 1 (August 2018): 23–29. http://dx.doi.org/10.15688/nbit.jvolsu.2018.1.4.
Full textVarga, Liz, Fatih Camci, Joby Boxall, et al. "Transforming Critical Infrastructure." International Journal of E-Planning Research 2, no. 3 (2013): 38–49. http://dx.doi.org/10.4018/ijepr.2013070104.
Full textWarren, Matthew J., and Shona Leitch. "Critical supply chain systems and critical infrastructure protection." International Journal of Logistics Economics and Globalisation 2, no. 2 (2010): 107. http://dx.doi.org/10.1504/ijleg.2010.032427.
Full textKrasov, A. V., N. N. Lansere, I. I. Fadeev, A. M. Gelfand, and M. V. Lesnevskii. "Typical ophthalmic critical information systems." Fyodorov journal of ophthalmic surgery, no. 1S (February 17, 2023): 85–91. http://dx.doi.org/10.25276/0235-4160-2022-4s-85-91.
Full textLewis, Ted G., Thomas J. Mackin, and Rudy Darken. "Critical Infrastructure as Complex Emergent Systems." International Journal of Cyber Warfare and Terrorism 1, no. 1 (2011): 1–12. http://dx.doi.org/10.4018/ijcwt.2011010101.
Full textLaplante, Phil, and Ben Amaba. "Artificial Intelligence in Critical Infrastructure Systems." Computer 54, no. 10 (2021): 14–24. http://dx.doi.org/10.1109/mc.2021.3055892.
Full textGEORGESCU, ALEXANDRU. "CRITICAL INFRASTRUCTURE DEPENDENCY ON SPACE SYSTEMS." Scientific Bulletin of Naval Academy 19, no. 1 (2016): 398–404. http://dx.doi.org/10.21279/1454-864x-16-i1-067.
Full textTabansky, L. "Critical Infrastructure Protection." International Journal of Cyber Warfare and Terrorism 3, no. 3 (2013): 80–87. http://dx.doi.org/10.4018/ijcwt.2013070106.
Full textCIEKANOWSKI, ZBIGNIEW, Sławomir Żurawski, and Henryk Wyrębek. "CRITICAL INFRASTRUCTURE THREATS." Studia Administracji i Bezpieczeństwa 13, no. 13 (2023): 263–72. http://dx.doi.org/10.5604/01.3001.0016.2902.
Full textCroope, Silvana V., and Sue McNeil. "Improving Resilience of Critical Infrastructure Systems Postdisaster." Transportation Research Record: Journal of the Transportation Research Board 2234, no. 1 (2011): 3–13. http://dx.doi.org/10.3141/2234-01.
Full textBanerjee, Joydeep, Kaustav Basu, and Arunabha Sen. "On hardening problems in critical infrastructure systems." International Journal of Critical Infrastructure Protection 23 (December 2018): 49–67. http://dx.doi.org/10.1016/j.ijcip.2018.08.001.
Full textParks, Raymond C., and Edmond Rogers. "Vulnerability Assessment for Critical Infrastructure Control Systems." IEEE Security & Privacy Magazine 6, no. 6 (2008): 37–43. http://dx.doi.org/10.1109/msp.2008.160.
Full textIzonin, Ivan, Tetiana Hovorushchenko, and Shishir Kumar Shandilya. "Quality and Security of Critical Infrastructure Systems." Big Data and Cognitive Computing 8, no. 1 (2024): 10. http://dx.doi.org/10.3390/bdcc8010010.
Full textFedotova, G. V., Yu A. Kapustina, A. G. Churaev, and Z. Yu Yuldashbayeva. "Cybersecurity of Critical Infrastructure Facilities." Proceedings of the Southwest State University. Series: Economics. Sociology. Management 13, no. 4 (2023): 111–22. http://dx.doi.org/10.21869/2223-1552-2023-13-4-111-122.
Full textMiller, Robert A. "There’s infrastructure and …critical infrastructure." International Journal of Critical Infrastructure Protection 2, no. 1-2 (2009): 3–4. http://dx.doi.org/10.1016/j.ijcip.2009.02.003.
Full textCzuryk, Małgorzata. "Cybersecurity and Protection of Critical Infrastructure." Studia Iuridica Lublinensia 32, no. 5 (2023): 43–52. http://dx.doi.org/10.17951/sil.2023.32.5.43-52.
Full textMinaev, V. A., I. D. Korolev, E. V. Zelentzova, and R. I. Zakharchenko. "Critical information infrastructure: sustainability assessment." Radio industry 28, no. 4 (2018): 59–67. http://dx.doi.org/10.21778/2413-9599-2018-28-4-59-67.
Full textSarker, Partha, and Henry D. Lester. "Post-Disaster Recovery Associations of Power Systems Dependent Critical Infrastructures." Infrastructures 4, no. 2 (2019): 30. http://dx.doi.org/10.3390/infrastructures4020030.
Full textQ. Tran, Huu, and Ho Van Khuong. "Effective capacity analysis of configurable intelligent surface-assisted NOMA communications systems." Bulletin of Electrical Engineering and Informatics 13, no. 4 (2024): 2388–96. http://dx.doi.org/10.11591/eei.v13i4.7485.
Full textPOTCOVARU, Sorina-Denisa. "SYSTEMIC APPROACH FOR CRITICAL INFRASTRUCTURES, HIDDEN VULNERABILITIES OF INTERDEPENDENCIES." STRATEGIES XXI - Command and Staff College 17, no. 1 (2021): 358–63. http://dx.doi.org/10.53477/2668-2028-21-46.
Full textPolycarpou, Marios M. "Fault Diagnostics and Security of Critical Infrastructure Systems." IFAC Proceedings Volumes 42, no. 8 (2009): 203–4. http://dx.doi.org/10.3182/20090630-4-es-2003.00033.
Full textLendak, Imre, Nikola Ivancevic, Srdjan Vukmirovic, Ervin Varga, Kosa Nenadic, and Aleksandar Erdeljan. "Client Side Internet Technologies in Critical Infrastructure Systems." International Journal of Computers Communications & Control 7, no. 5 (2014): 879. http://dx.doi.org/10.15837/ijccc.2012.5.1343.
Full textVerma, Saurabh, Pankaj Pali, Pavani Kori, and Muskan Tiwari. "Advanced Threat Detection Systems for Protecting Critical Infrastructure." International Journal of Innovative Research in Computer and Communication Engineering 11, no. 06 (2023): 8896–901. http://dx.doi.org/10.15680/ijircce.2023.1106077.
Full textKete, Nancy, Giuliano Punzo, and Igor Linkov. "Enhancing resilience within and between critical infrastructure systems." Environment Systems and Decisions 38, no. 3 (2018): 275–77. http://dx.doi.org/10.1007/s10669-018-9706-5.
Full textMontillet, Jean-Philippe, Walter M. Szeliga, Timothy I. Melbourne, Rex M. Flake, and Gavin Schrock. "Critical Infrastructure Monitoring with Global Navigation Satellite Systems." Journal of Surveying Engineering 142, no. 4 (2016): 04016014. http://dx.doi.org/10.1061/(asce)su.1943-5428.0000181.
Full textScholz, James A. "Securing Critical IT Infrastructure." Information Security Journal: A Global Perspective 18, no. 1 (2009): 33–39. http://dx.doi.org/10.1080/19393550802644640.
Full text