To see the other types of publications on this topic, follow the link: Critical infrastructure systems (CISs).

Journal articles on the topic 'Critical infrastructure systems (CISs)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Critical infrastructure systems (CISs).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Constantinos, Heracleous, Kolios Panayiotis, G. Panayiotou Christos, Ellinas Georgios, and M. Polycarpou Marios. "Hybrid systems modeling for critical infrastructures interdependency analysis." Reliability Engineering & System Safety 165 (September 1, 2017): 89–101. https://doi.org/10.1016/j.ress.2017.03.028.

Full text
Abstract:
 Critical infrastructure systems (CISs) are large scale and complex systems, across which many interdependencies exist. As a result, several modeling and simulation approaches are being employed to study the concurrent operation of multiple CISs and their interdependencies. Complementary to existing literature, this work develops and implements a modeling and simulation framework based on open hybrid automata to analyze CISs interdependencies. With the proposed approach, it is possible to develop accurate models of infrastructure components, and interlink them together based on their depe
APA, Harvard, Vancouver, ISO, and other styles
2

Mottahedi, Adel, Farhang Sereshki, Mohammad Ataei, Ali Nouri Qarahasanlou, and Abbas Barabadi. "The Resilience of Critical Infrastructure Systems: A Systematic Literature Review." Energies 14, no. 6 (2021): 1571. http://dx.doi.org/10.3390/en14061571.

Full text
Abstract:
Risk management is a fundamental approach to improving critical infrastructure systems’ safety against disruptive events. This approach focuses on designing robust critical infrastructure systems (CISs) that could resist disruptive events by minimizing the possible events’ probability and consequences using preventive and protective programs. However, recent disasters like COVID-19 have shown that most CISs cannot stand against all potential disruptions. Recently there is a transition from robust design to resilience design of CISs, increasing the focus on preparedness, response, and recovery.
APA, Harvard, Vancouver, ISO, and other styles
3

Sarker, Partha, Bhushan Lohar, Sean Walker, Stephanie Patch, and John T. Wade. "Recovery Resiliency Characteristics of Interdependent Critical Infrastructures in Disaster-Prone Areas." Infrastructures 9, no. 11 (2024): 208. http://dx.doi.org/10.3390/infrastructures9110208.

Full text
Abstract:
When Hurricane Maria struck the island of Puerto Rico in September, 2017, it devastated the island’s critical infrastructures, including the well-documented total loss of electric power systems. The strong interdependencies or associations among critical infrastructures in modern society meant that the failure of power systems propagated to and exacerbated the failure of other infrastructure systems. Moreover, these associations impact systems recovery just as they impact system failure. This study is a follow-up of previous research by the first author on Hurricane Maria. In this research aut
APA, Harvard, Vancouver, ISO, and other styles
4

Espada, Rodolfo Jr, Armando Apan, and Kevin McDougall. "Vulnerability assessment and interdependency analysis of critical infrastructures for climate adaptation and flood mitigation." International Journal of Disaster Resilience in the Built Environment 6, no. 3 (2015): 313–46. http://dx.doi.org/10.1108/ijdrbe-02-2014-0019.

Full text
Abstract:
Purpose – The purpose of this paper is to present a novel approach that examines the vulnerability and interdependency of critical infrastructures using the network theory in geographic information system (GIS) setting in combination with literature and government reports. Specifically, the objectives of this study were to generate the network models of critical infrastructure systems (CISs), particularly electricity, roads and sewerage networks; to characterize the CISs’ interdependencies; and to outline the climate adaptation (CA) and flood mitigation measures of CIS. Design/methodology/appr
APA, Harvard, Vancouver, ISO, and other styles
5

Raman, Gauthama, and Aditya Mathur. "Fusing Design and Machine Learning for Anomaly Detection in Water Treatment Plants." Electronics 13, no. 12 (2024): 2267. http://dx.doi.org/10.3390/electronics13122267.

Full text
Abstract:
Accurate detection of process anomalies is crucial for maintaining reliable operations in critical infrastructures such as water treatment plants. Traditional methods for creating anomaly detection systems in these facilities typically focus on either design-based strategies, which encompass physical and engineering aspects, or on data-driven models that utilize machine learning to interpret complex data patterns. Challenges in creating these detectors arise from factors such as dynamic operating conditions, lack of design knowledge, and the complex interdependencies among heterogeneous compon
APA, Harvard, Vancouver, ISO, and other styles
6

Mao, Quan, and Yuechen Liu. "Post-Disaster Performance and Restoration Sequences of Interdependent Critical Infrastructure Systems Considering Various Socioeconomic Impacts." Sustainability 16, no. 15 (2024): 6609. http://dx.doi.org/10.3390/su16156609.

Full text
Abstract:
The failures of interdependent critical infrastructure systems (CISs) caused by disasters could result in significant impacts on the economy and society of cities. Although existing studies have proposed several socioeconomic impact indicators of CIS failures, using these indicators as optimization objectives of restoration sequences, most of them only selected one indicator and failed to reveal their differences. This study aims to analyze the differences between various socioeconomic impact indicators in evaluating post-disaster CIS performance and to identify their effects on the optimized
APA, Harvard, Vancouver, ISO, and other styles
7

Sun, Li, Haijiang Li, Joseph Nagel, and Siyao Yang. "Convergence of AI and Urban Emergency Responses: Emerging Pathway toward Resilient and Equitable Communities." Applied Sciences 14, no. 17 (2024): 7949. http://dx.doi.org/10.3390/app14177949.

Full text
Abstract:
Urban communities have long been pivotal in wealth creation and technological innovation. In the contemporary context, their modus operandi is intricately tied to a diverse array of critical infrastructure systems (CISs). These systems—encompassing utilities, transportation, communication, and more—are indispensable for daily life; however, historical lessons underscore that the ever-growing interdependence among modern CISs has sapped their robustness. Furthermore, this vulnerability is compounded by the intensifying natural hazards catalysed by climate change, leaving urban communities with
APA, Harvard, Vancouver, ISO, and other styles
8

Ramage, Xavier, Khutso Lebea, and Siphesihle Sithungu. "Cyber Warfare and Critical Infrastructure." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 566–75. https://doi.org/10.34190/eccws.24.1.3526.

Full text
Abstract:
This paper identifies the growing threat that cyber warfare poses to a country's Critical Infrastructure (CI) and the Critical Information Infrastructure (CII) that accompanies it. CI is a term that describes all of the essential systems and services needed for the nation to function. CII describes the Information Systems responsible for the CI's operation. This includes energy grids, finance, water supplies, transportation, and healthcare facilities. This paper will focus mainly on the CI related to energy grids and finance. With the growing integration of digital technologies into these sect
APA, Harvard, Vancouver, ISO, and other styles
9

Kulugh, Victor Emmanuel, Ageebee Silas Faki, and Egena Onu. "Theoretical Framework of Cybersecurity Resilience Maturity Assessment Model for Critical Information Infrastructure." Dutse Journal of Pure and Applied Sciences 11, no. 1b (2025): 75–85. https://doi.org/10.4314/dujopas.v11i1b.9.

Full text
Abstract:
Modern Societies depend heavily on Critical infrastructures (CIs) to thrive. The CI in turn is driven by critical information infrastructures (CIIs) which is a combination of information technology (IT) and operations technology (OT). However, the CIs are underpinned by the CIIs, thus, they (CIs) inherit the vulnerabilities of the CIIs and share the same threats as the CIIs. Failure of the CIIs driving the CIs will potentially lead to catastrophic consequences arising from cascaded, escalating and common cause effects against other dependent/ interdependent CIs/CIIs. Consequently, the CIIs sho
APA, Harvard, Vancouver, ISO, and other styles
10

Pervan, Graham. "How Chief Executive Officers in Large Organizations View the Management of their Information Systems." Journal of Information Technology 13, no. 2 (1998): 95–109. http://dx.doi.org/10.1177/026839629801300203.

Full text
Abstract:
As part of a research programme on key information systems (IS) management issues, a survey of Australasia's largest organizations was conducted to identify which issues were perceived by their chief executive officers (CEOs) as being important, problematic and critical over the next 3–5 years. The results reported are based on a moderate response rate (though perhaps reasonable for the target group) but formal testing showed an absence of non-response bias. The most critical issues were revealed to be a mix of technology management issues (managing and measuring the effectiveness of the infor
APA, Harvard, Vancouver, ISO, and other styles
11

Yevseiev, Serhii, Yevgen Melenti, Oleksandr Voitko, et al. "Development of a concept for building a critical infrastructure facilities security system." Eastern-European Journal of Enterprise Technologies 3, no. 9(111) (2021): 63–83. http://dx.doi.org/10.15587/1729-4061.2021.233533.

Full text
Abstract:
To effectively protect critical infrastructure facilities (CIF), it is important to understand the focus of cybersecurity efforts. The concept of building security systems based on a variety of models describing various CIF functioning aspects is presented. The development of the concept is presented as a sequence of solving the following tasks. The basic concepts related to cyberattacks on CIF were determined, which make it possible to outline the boundaries of the problem and determine the level of formalization of the modeling processes. The proposed threat model takes into account possible
APA, Harvard, Vancouver, ISO, and other styles
12

Serhii, Yevseiev, Melenti Yevgen, Voitko Oleksandr, et al. "Development of a concept for building a critical infrastructure facilities security system." Eastern-European Journal of Enterprise Technologies 3, no. 9 (111) (2021): 63–83. https://doi.org/10.15587/1729-4061.2021.233533.

Full text
Abstract:
To effectively protect critical infrastructure facilities (CIF), it is important to understand the focus of cybersecurity efforts. The concept of building security systems based on a variety of models describing various CIF functioning aspects is presented. The development of the concept is presented as a sequence of solving the following tasks. The basic concepts related to cyberattacks on CIF were determined, which make it possible to outline the boundaries of the problem and determine the level of formalization of the modeling processes. The proposed threat model takes into account possible
APA, Harvard, Vancouver, ISO, and other styles
13

Adebonojo, Anthony A., Kirk A. Moen, and Jennifer L. Russell. "MBSE Analysis & Update of U.S. Infrastructure Data Taxonomy (IDT) Using U.S. National Critical Functions (NCFs)." INCOSE International Symposium 34, no. 1 (2024): 2048–68. http://dx.doi.org/10.1002/iis2.13255.

Full text
Abstract:
AbstractIn this paper, we will demonstrate the application of Model‐Based Systems Engineering (MBSE) tools and techniques we have used to assist the U.S. Department of Homeland Security (DHS) / Cybersecurity Infrastructure Security Agency (CISA) in analysis of open‐source Infrastructure Data Taxonomy (IDT) data to analyze and contribute to the updates required for their IDT. We will show how we have used Functional Analysis, Logical Structure Taxonomies, and MBSE tools to analyze the IDT alongside the DHS National Critical Functions (NCFs) to recommend and improve these updat
APA, Harvard, Vancouver, ISO, and other styles
14

Carroll, Jami. "The U.S. National Cybersecurity Strategy: A Vehicle with an International Journey." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 107–15. http://dx.doi.org/10.34190/eccws.23.1.2300.

Full text
Abstract:
The U.S. National Cybersecurity Strategy is focused on the five pillars of defending critical infrastructure: detect, disrupt, and dismantle threat actors; improve market resilience and security; invest in future resilience; and create international partnerships with shared goals. The National Cybersecurity Strategy Implementation Plan is focused on critical infrastructure supporting energy, financial, healthcare, information technology, and manufacturing sectors. In the U.S. alone, the SolarWinds supply chain attack affected nine federal agencies and about 100 companies. Ransomware attacks su
APA, Harvard, Vancouver, ISO, and other styles
15

Bukunmi Temiloluwa Ofili, Emmanuella Osaruwenese Erhabor, and Oghogho Timothy Obasuyi. "Enhancing federal cloud security with AI: Zero trust, threat intelligence and CISA Compliance." World Journal of Advanced Research and Reviews 25, no. 2 (2025): 2377–400. https://doi.org/10.30574/wjarr.2025.25.2.0620.

Full text
Abstract:
The increasing adoption of cloud computing by federal agencies has introduced significant security challenges, necessitating robust strategies to protect sensitive government data. Traditional perimeter-based security models are no longer sufficient against evolving cyber threats, leading to the need for Zero Trust Architecture (ZTA), AI-driven threat intelligence, and compliance with Cybersecurity and Infrastructure Security Agency (CISA) frameworks. This paper explores how artificial intelligence (AI) enhances federal cloud security by enabling adaptive access controls, automated anomaly det
APA, Harvard, Vancouver, ISO, and other styles
16

Callcut, Matthew, Jean-Paul Cerceau Agliozzo, Liz Varga, and Lauren McMillan. "Digital Twins in Civil Infrastructure Systems." Sustainability 13, no. 20 (2021): 11549. http://dx.doi.org/10.3390/su132011549.

Full text
Abstract:
This research explores the existing definitions, concepts and applications surrounding the efficient implementation and use of digital twins (DTs) within civil infrastructure systems (CISs). The CISs within the scope of this research are as follows: transportation, energy, telecommunications, water and waste, as well as Smart Cities, which encompasses all of the previous. The research methodology consists of a review of current literature, a series of semi-structured interviews and a detailed survey. The outcome of this work is a refined definition of DTs within CISs, in addition to a set of r
APA, Harvard, Vancouver, ISO, and other styles
17

Mykhaylovskyi, Denys, Ihor Skliarov, and Oleh Komar. "Comparison of methods for calculating the parameters of an explosion shock wave for the design of protective engineering structures." Building constructions. Theory and Practice, no. 16 (June 28, 2025): 110–22. https://doi.org/10.32347/2522-4182.16.2025.110-122.

Full text
Abstract:
The military aggression of the Russian Federation against Ukraine, through the use of the full range of enemy aerial attack means not only against military targets but also against critical infrastructure objects (hereinafter – CIOs) [1, 2] and other civilian facilities, has brought significant changes in the construction of protective and civil defense structures. The current regulatory documents [3] were developed under the assumption of a single nuclear explosion occurring at a considerable distance from the facility, which is why the design of building structures was carried out without ta
APA, Harvard, Vancouver, ISO, and other styles
18

Ma, Jiajun, Guohua Chen, Tao Zeng, Lixing Zhou, Jie Zhao, and Yuanfei Zhao. "Methodology for Resilience Assessment of Oil Pipeline Network System Exposed to Earthquake." Sustainability 15, no. 2 (2023): 972. http://dx.doi.org/10.3390/su15020972.

Full text
Abstract:
The oil pipeline network system (OPNS) is an essential part of the critical infrastructure networks (CINs), and is vulnerable to earthquakes. Assessing and enhancing the resilience of the OPNS can improve its capability to cope with earthquakes or to recover the system’s performance quickly after the disturbance. This study defines the concept of OPNS resilience in the resistive ability, the adaptive ability, and the recovery ability. Then, the quantitative resilience assessment model is established considering the earthquake intensities, the role of safety barriers, the time-variant reliabili
APA, Harvard, Vancouver, ISO, and other styles
19

Nafisat Zajime Bako, Chidiebube Nelson Ozioko, Ismail Oluwasola Sanni, and Olumide Oni. "The Integration of AI and blockchain technologies for secure data management in cybersecurity." World Journal of Advanced Research and Reviews 25, no. 3 (2025): 1666–97. https://doi.org/10.30574/wjarr.2025.25.3.0784.

Full text
Abstract:
Introduction: This review examines the integration of artificial intelligence (AI) and blockchain technologies for secure data management in cybersecurity across the United States. Due to the growing instances of cyber threats today, organizations and government agencies are looking at new ways of technological integration to enhance the aspect of data protection. This paper aims to establish how AI and blockchain functions together to provide secure solutions to the current cybersecurity threats. Materials and Methods: This article adopts the secondary research approach that involves the use
APA, Harvard, Vancouver, ISO, and other styles
20

Oyekunle, Seun Michael, Olufisayo Juliana Tiwo, Temilade Oluwatoyin Adesokan-Imran, Adekunbi Justina Ajayi, Ademola Oluwaseun Salako, and Oluwaseun Oladeji Olaniyi. "Enhancing Data Resilience in Cloud-based Electronics Health Records through Ransomware Mitigation Strategies Using NIST and MITRE ATT&CK Frameworks." Journal of Engineering Research and Reports 27, no. 3 (2025): 436–57. https://doi.org/10.9734/jerr/2025/v27i31444.

Full text
Abstract:
The increasing adoption of cloud-based Electronic Health Records (EHRs) has transformed healthcare by enhancing data accessibility, interoperability, and patient care efficiency. However, this transition has also introduced new cybersecurity vulnerabilities, with ransomware emerging as a critical threat to healthcare systems. Ransomware attacks disrupt medical services, compromise patient confidentiality, and impose significant financial burdens on institutions. This study comprehensively examines ransomware threats in cloud-based EHR environments by analyzing vulnerabilities, attack vectors,
APA, Harvard, Vancouver, ISO, and other styles
21

Schweitzer, M., and A. Hoerbst. "A Systematic Investigation on Barriers and Critical Success Factors for Clinical Information Systems in Integrated Care Settings." Yearbook of Medical Informatics 24, no. 01 (2015): 79–89. http://dx.doi.org/10.15265/iy-2015-018.

Full text
Abstract:
Summary Objectives: Clinical Information Systems (CIS) have ever since the introduction of information technology in healthcare played an important role to support healthcare professionals and the process of treatment. With the rise of the concept of integrated care organizational borders, the sole focus on data aggregation or healthcare professionals as users disappear more and more. The manuscript discusses the concept of CISs and investigates critical success factors for CISs in the context of integrated care and in the course of time. Methods: In order to identify critical success factors
APA, Harvard, Vancouver, ISO, and other styles
22

Pye, Graeme. "Critical Infrastructure Systems." International Journal of Cyber Warfare and Terrorism 1, no. 3 (2011): 37–58. http://dx.doi.org/10.4018/ijcwt.2011070103.

Full text
Abstract:
A system security analysis and system modelling framework tool is proposed adopting an associated conceptual methodology as the basis for assessing security and conceptually modelling a critical infrastructure system incident. The intent is to identify potential system security issues and gain operational insights that will contribute to improving system resilience, contingency planning, disaster recovery and ameliorating incident management responses for critical infrastructure system incidents. The aforementioned system security analysis and modelling framework is applied to an adverse criti
APA, Harvard, Vancouver, ISO, and other styles
23

Wright, Blake. "Cybersecurity: The Forever Problem." Journal of Petroleum Technology 73, no. 07 (2021): 26–29. http://dx.doi.org/10.2118/0721-0026-jpt.

Full text
Abstract:
The oil and gas business has become as much about bytes as barrels in recent years. Artificial intelligence, the internet of things (IoT), big data, and the ongoing digitization of the industry have not only made it a more-efficient machine but also a target to unscrupulous sorts looking to confound, cash in, and move on. As more information comes forward regarding the May 2021 ransomware attack on Colonial Pipeline, it appears to have been a cash grab with the knock-on effect of physically crippling the company’s flow of fuel to East Coast states. The outage was never the goal, but what it if
APA, Harvard, Vancouver, ISO, and other styles
24

Kalogeraki, Eleni-Maria, Spyridon Papastergiou, and Themis Panayiotopoulos. "An Attack Simulation and Evidence Chains Generation Model for Critical Information Infrastructures." Electronics 11, no. 3 (2022): 404. http://dx.doi.org/10.3390/electronics11030404.

Full text
Abstract:
Recently, the rapid growth of technology and the increased teleworking due to the COVID-19 outbreak have motivated cyber attackers to advance their skills and develop new sophisticated methods, e.g., Advanced Persistent Threat (APT) attacks, to leverage their cybercriminal capabilities. They compromise interconnected Critical Information Infrastructures (CIIs) (e.g., Supervisory Control and Data Acquisition (SCADA) systems) by exploiting a series of vulnerabilities and launching multiple attacks. In this context, industry players need to increase their knowledge on the security of the CIs they
APA, Harvard, Vancouver, ISO, and other styles
25

Zangiev, Taimuraz, Elizar Tarasov, Vladimir Sotnikov, Zalina Tugusheva, and Fatima Gunay. "About One Approach to the Selection of Information Protection Facilities." NBI Technologies, no. 1 (August 2018): 23–29. http://dx.doi.org/10.15688/nbit.jvolsu.2018.1.4.

Full text
Abstract:
Much attention in the sphere of information technology is paid to the aspects of information security, due to the growing damage. As a result of damage increase, there is a quantitative and qualitative growth in the market of software and hardware for information security. At the same time, new alternatives to existing information security tools are being developed, as well as means of protection against new vectors of attacks associated, for example, with the spread of the concept of ‘Internet of things’, big data and cloud technologies. At the same time, the analysis of information security
APA, Harvard, Vancouver, ISO, and other styles
26

Varga, Liz, Fatih Camci, Joby Boxall, et al. "Transforming Critical Infrastructure." International Journal of E-Planning Research 2, no. 3 (2013): 38–49. http://dx.doi.org/10.4018/ijepr.2013070104.

Full text
Abstract:
The application of complexity science to policy for critical infrastructure systems has never been more important. A number of issues highlight the need for policy to match the complexity of the co-evolving environment: increasing interdependency between utilities, uncontrolled demand leading to over use of diminishing resources, diverse technological opportunities with unclear investment choices, governance at different scales, public-private ownership differences and emerging business models. Systems are now so complex that people do not understand the interdependencies. Individual utilities
APA, Harvard, Vancouver, ISO, and other styles
27

Warren, Matthew J., and Shona Leitch. "Critical supply chain systems and critical infrastructure protection." International Journal of Logistics Economics and Globalisation 2, no. 2 (2010): 107. http://dx.doi.org/10.1504/ijleg.2010.032427.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Krasov, A. V., N. N. Lansere, I. I. Fadeev, A. M. Gelfand, and M. V. Lesnevskii. "Typical ophthalmic critical information systems." Fyodorov journal of ophthalmic surgery, no. 1S (February 17, 2023): 85–91. http://dx.doi.org/10.25276/0235-4160-2022-4s-85-91.

Full text
Abstract:
Relevance. According to the law « the security of critical information infrastructure of the Russian Federation» 26.07.2017 No. 187-FZ information systems used in ophthalmology can be classified as significant objects of critical information infrastructure if a targeted computer attack can cause serious damage (assessed by five significance indicators). The study considers common objects of critical information infrastructure in the healthcare sector, analyzes typical ophthalmic automated control systems, assesses actual offenders for these systems and the consequences of the implementation of
APA, Harvard, Vancouver, ISO, and other styles
29

Lewis, Ted G., Thomas J. Mackin, and Rudy Darken. "Critical Infrastructure as Complex Emergent Systems." International Journal of Cyber Warfare and Terrorism 1, no. 1 (2011): 1–12. http://dx.doi.org/10.4018/ijcwt.2011010101.

Full text
Abstract:
The United States Department of Homeland Security (DHS) charge is to, “Build a safer, more secure, and more resilient America by preventing, deterring, neutralizing, or mitigating the effects of deliberate efforts by terrorists to destroy, incapacitate, or exploit elements of our Nation’s CIKR …” using an all-hazards approach. The effective implementation of this strategy hinges on understanding catastrophes and their potential effect on the functioning of infrastructure. Unfortunately, there has been no unifying theory of catastrophe to guide decision-making, preparedness, or response. In thi
APA, Harvard, Vancouver, ISO, and other styles
30

Laplante, Phil, and Ben Amaba. "Artificial Intelligence in Critical Infrastructure Systems." Computer 54, no. 10 (2021): 14–24. http://dx.doi.org/10.1109/mc.2021.3055892.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

GEORGESCU, ALEXANDRU. "CRITICAL INFRASTRUCTURE DEPENDENCY ON SPACE SYSTEMS." Scientific Bulletin of Naval Academy 19, no. 1 (2016): 398–404. http://dx.doi.org/10.21279/1454-864x-16-i1-067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Tabansky, L. "Critical Infrastructure Protection." International Journal of Cyber Warfare and Terrorism 3, no. 3 (2013): 80–87. http://dx.doi.org/10.4018/ijcwt.2013070106.

Full text
Abstract:
Cyber Warfare holds a grave hazard of striking national infrastructure while circumventing traditional defense systems. This article examines the evolution of Critical Infrastructure Protection (CIP) policy in Israel and analyses its performance. Israel has developed a unique legal and regulatory model for critical infrastructure protection, which was implemented in late 2002. Recently, a comprehensive review of cyber security posture has been conducted, and significant policy changes are in progress. The Israeli approach to CIP and beyond, fostering cooperation between public, security, acade
APA, Harvard, Vancouver, ISO, and other styles
33

CIEKANOWSKI, ZBIGNIEW, Sławomir Żurawski, and Henryk Wyrębek. "CRITICAL INFRASTRUCTURE THREATS." Studia Administracji i Bezpieczeństwa 13, no. 13 (2023): 263–72. http://dx.doi.org/10.5604/01.3001.0016.2902.

Full text
Abstract:
The aim of the article was to analyze Polish and European Union legislation in the field of critical infrastructure protection in the elements essential for the functioning of the Polish state and the European Union. In the first part, the authors show the role of critical infrastructure in the functioning of the state. Then, they characterize the threats as well as popular systems and methods used to protect CI against terrorist threats. The next part analyzes the legislation which relates to an international organization such as the European Union. Summing up, the authors explain the concept
APA, Harvard, Vancouver, ISO, and other styles
34

Croope, Silvana V., and Sue McNeil. "Improving Resilience of Critical Infrastructure Systems Postdisaster." Transportation Research Record: Journal of the Transportation Research Board 2234, no. 1 (2011): 3–13. http://dx.doi.org/10.3141/2234-01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Banerjee, Joydeep, Kaustav Basu, and Arunabha Sen. "On hardening problems in critical infrastructure systems." International Journal of Critical Infrastructure Protection 23 (December 2018): 49–67. http://dx.doi.org/10.1016/j.ijcip.2018.08.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Parks, Raymond C., and Edmond Rogers. "Vulnerability Assessment for Critical Infrastructure Control Systems." IEEE Security & Privacy Magazine 6, no. 6 (2008): 37–43. http://dx.doi.org/10.1109/msp.2008.160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Izonin, Ivan, Tetiana Hovorushchenko, and Shishir Kumar Shandilya. "Quality and Security of Critical Infrastructure Systems." Big Data and Cognitive Computing 8, no. 1 (2024): 10. http://dx.doi.org/10.3390/bdcc8010010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Fedotova, G. V., Yu A. Kapustina, A. G. Churaev, and Z. Yu Yuldashbayeva. "Cybersecurity of Critical Infrastructure Facilities." Proceedings of the Southwest State University. Series: Economics. Sociology. Management 13, no. 4 (2023): 111–22. http://dx.doi.org/10.21869/2223-1552-2023-13-4-111-122.

Full text
Abstract:
Relevance. The cybersecurity of information systems and services is becoming one of the important criteria for the quality of services and production of goods in modern society, just like the stability and speed of data transfer. Developers of software products and applications are concerned about the increase in the number of attacks on their systems, the increase in the theft of information and assets. The confrontation between Russia and NATO countries has intensified the growth of geopolitical threats and hacker intrusions into the information system of Russia with the aim of destabilizing
APA, Harvard, Vancouver, ISO, and other styles
39

Miller, Robert A. "There’s infrastructure and …critical infrastructure." International Journal of Critical Infrastructure Protection 2, no. 1-2 (2009): 3–4. http://dx.doi.org/10.1016/j.ijcip.2009.02.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Czuryk, Małgorzata. "Cybersecurity and Protection of Critical Infrastructure." Studia Iuridica Lublinensia 32, no. 5 (2023): 43–52. http://dx.doi.org/10.17951/sil.2023.32.5.43-52.

Full text
Abstract:
The functioning of critical infrastructure depends on information and communication technologies (ICT) systems that enable its equipment or facilities to operate smoothly. Threats to its functioning can present a major issue for the state and society, as it also spans strategic sectors which overlap with the essential services which remain within the purview of operators of essential services. Because of the relationship that links strategic systems within critical infrastructure and simultaneously supports its operation with essential services, ensuring cybersecurity will also affect the prot
APA, Harvard, Vancouver, ISO, and other styles
41

Minaev, V. A., I. D. Korolev, E. V. Zelentzova, and R. I. Zakharchenko. "Critical information infrastructure: sustainability assessment." Radio industry 28, no. 4 (2018): 59–67. http://dx.doi.org/10.21778/2413-9599-2018-28-4-59-67.

Full text
Abstract:
The paper considers the approach to the assessment of critical information infrastructure circulating in the information system in terms of confrontation. The novelty of the study is a promising method allowing assessment of complex technical systems with a high degree of criticality and uncertainty of description. The value of the integral criterion is proposed as an assessment of the ability to implement the objective function of critical information infrastructure at each time point. Based on this method, it became possible to improve the quality of substantiation of new ways of confrontati
APA, Harvard, Vancouver, ISO, and other styles
42

Sarker, Partha, and Henry D. Lester. "Post-Disaster Recovery Associations of Power Systems Dependent Critical Infrastructures." Infrastructures 4, no. 2 (2019): 30. http://dx.doi.org/10.3390/infrastructures4020030.

Full text
Abstract:
The complete failure of the power systems infrastructure in Puerto Rico, following Hurricanes Irma and Maria in 2017, severely hampered the recovery efforts of multiple critical infrastructure systems (CIS). Understanding the relationships of infrastructure recovery efforts between power infrastructure systems and the other CIS has the potential to be a key in developing an effective recovery plan leading to resilient infrastructure systems, and thereby a more resilient community. This paper explores the critical interfaces and interdependencies in CIS recovery by examining the disruptions and
APA, Harvard, Vancouver, ISO, and other styles
43

Q. Tran, Huu, and Ho Van Khuong. "Effective capacity analysis of configurable intelligent surface-assisted NOMA communications systems." Bulletin of Electrical Engineering and Informatics 13, no. 4 (2024): 2388–96. http://dx.doi.org/10.11591/eei.v13i4.7485.

Full text
Abstract:
This paper investigates the integration of configurable intelligent surfaces (CIS) into relay radio networks, focusing on communication system enhancement. Towards this end, we propose CIS-assisted non-orthogonal multiple access (NOMA) communication systems to improve direct connections between a base station and two destination nodes. Our primary objective is to assess the net-work’s overall capacity, considering critical factors like signal-to-noise ratio, the number and placement of CIS components, quality of service exponent, and power distribution coefficients. Analytical equations develo
APA, Harvard, Vancouver, ISO, and other styles
44

POTCOVARU, Sorina-Denisa. "SYSTEMIC APPROACH FOR CRITICAL INFRASTRUCTURES, HIDDEN VULNERABILITIES OF INTERDEPENDENCIES." STRATEGIES XXI - Command and Staff College 17, no. 1 (2021): 358–63. http://dx.doi.org/10.53477/2668-2028-21-46.

Full text
Abstract:
Abstract: The growing scientific interest in the field of critical infrastructure protection has been determined by society's growing dependence on the essential services provided by these infrastructures. Critical infrastructures do not work isolated, they establish complex and dynamic networks of interdependencies. A critical infrastructure is itself a system with its own components and operating principles, a system connected to a system of systems based on multiple determinations. Critical infrastructure systems are built based on interdependent relationships between infrastructures, manif
APA, Harvard, Vancouver, ISO, and other styles
45

Polycarpou, Marios M. "Fault Diagnostics and Security of Critical Infrastructure Systems." IFAC Proceedings Volumes 42, no. 8 (2009): 203–4. http://dx.doi.org/10.3182/20090630-4-es-2003.00033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Lendak, Imre, Nikola Ivancevic, Srdjan Vukmirovic, Ervin Varga, Kosa Nenadic, and Aleksandar Erdeljan. "Client Side Internet Technologies in Critical Infrastructure Systems." International Journal of Computers Communications & Control 7, no. 5 (2014): 879. http://dx.doi.org/10.15837/ijccc.2012.5.1343.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Verma, Saurabh, Pankaj Pali, Pavani Kori, and Muskan Tiwari. "Advanced Threat Detection Systems for Protecting Critical Infrastructure." International Journal of Innovative Research in Computer and Communication Engineering 11, no. 06 (2023): 8896–901. http://dx.doi.org/10.15680/ijircce.2023.1106077.

Full text
Abstract:
As critical infrastructure increasingly relies on digital technologies and interconnected systems, the security landscape becomes more complex, necessitating advanced threat detection systems to protect these essential assets. This paper reviews contemporary approaches and technologies for threat detection in critical infrastructure, including machine learning algorithms, anomaly detection techniques, and hybrid security models. It investigates the effectiveness of these systems in real-time monitoring, integration of advanced analytics, and the use of predictive models to anticipate and mitig
APA, Harvard, Vancouver, ISO, and other styles
48

Kete, Nancy, Giuliano Punzo, and Igor Linkov. "Enhancing resilience within and between critical infrastructure systems." Environment Systems and Decisions 38, no. 3 (2018): 275–77. http://dx.doi.org/10.1007/s10669-018-9706-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Montillet, Jean-Philippe, Walter M. Szeliga, Timothy I. Melbourne, Rex M. Flake, and Gavin Schrock. "Critical Infrastructure Monitoring with Global Navigation Satellite Systems." Journal of Surveying Engineering 142, no. 4 (2016): 04016014. http://dx.doi.org/10.1061/(asce)su.1943-5428.0000181.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Scholz, James A. "Securing Critical IT Infrastructure." Information Security Journal: A Global Perspective 18, no. 1 (2009): 33–39. http://dx.doi.org/10.1080/19393550802644640.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!