Journal articles on the topic 'National Critical Infrastructures'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'National Critical Infrastructures.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Neikova, Maria. "LEGAL APPROACH TO IMPLEMENTING SECURITY MEASURES FOR COMBATTING THREATS TO NATIONAL CRITICAL INFRASTRUCTURES." ENVIRONMENT. TECHNOLOGIES. RESOURCES. Proceedings of the International Scientific and Practical Conference 4 (June 22, 2024): 190–93. http://dx.doi.org/10.17770/etr2024vol4.8240.
Full textPĂTRAȘCU, Petrișor. "National Security Strategies and Critical Infrastructure: An Analysis of the European Union Member States." Romanian Military Thinking 2022, no. 3 (2022): 10–29. http://dx.doi.org/10.55535/rmt.2022.3.01.
Full textPĂTRAȘCU, Petrișor. "Strategiile naționale de securitate și infrastructurile critice: o analiză a statelor membre ale Uniunii Europene." Gândirea Militară Românească 2022, no. 3 (2022): 10–29. http://dx.doi.org/10.55535/gmr.2022.3.01.
Full textAlexandru, Adriana, Victor Vevera, and Ella Magdalena Ciupercă. "National Security and Critical Infrastructure Protection." International conference KNOWLEDGE-BASED ORGANIZATION 25, no. 1 (2019): 8–13. http://dx.doi.org/10.2478/kbo-2019-0001.
Full textHouck, David J., Eunyoung Kim, Gerard P. O'Reilly, David D. Picklesimer, and Huseyin Uzunalioglu. "A network survivability model for critical national infrastructures." Bell Labs Technical Journal 8, no. 4 (2004): 153–72. http://dx.doi.org/10.1002/bltj.10093.
Full textCHIȚAC, Georgiana-Cătălina. "CRITICAL INFRASTRUCTURES AND THEIR IMPORTANCE IN MODERN SOCIETIES – PROTECTION, SAFETY, SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (2021): 389–98. http://dx.doi.org/10.53477/2668-2028-21-51.
Full textObodoeze, Fidelis Chukwujekwu, Ifeyinwa Nkemdilim Obiokafor, and Tochukwu Chijindu Asogwa. "SCADA for National Critical Infrastructures: Review of the Security Threats, Vulnerabilities and Countermeasures." International Journal of Trend in Scientific Research and Development Volume-2, Issue-2 (2018): 974–82. http://dx.doi.org/10.31142/ijtsrd9556.
Full textDawson, Maurice, Robert Bacius, Luis Borges Gouveia, and Andreas Vassilakos. "Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors." Land Forces Academy Review 26, no. 1 (2021): 69–75. http://dx.doi.org/10.2478/raft-2021-0011.
Full textMaglaras, Leandros, Ioanna Kantzavelou, and Mohamed Amine Ferrag. "Digital Transformation and Cybersecurity of Critical Infrastructures." Applied Sciences 11, no. 18 (2021): 8357. http://dx.doi.org/10.3390/app11188357.
Full textMonstadt, Jochen, and Martin Schmidt. "Urban resilience in the making? The governance of critical infrastructures in German cities." Urban Studies 56, no. 11 (2019): 2353–71. http://dx.doi.org/10.1177/0042098018808483.
Full textGeers, Kenneth. "The Cyber Threat to National Critical Infrastructures: Beyond Theory." Journal of Digital Forensic Practice 3, no. 2-4 (2010): 124–30. http://dx.doi.org/10.1080/15567281.2010.536735.
Full textGeers, Kenneth. "The Cyber Threat to National Critical Infrastructures: Beyond Theory." Information Security Journal: A Global Perspective 18, no. 1 (2009): 1–7. http://dx.doi.org/10.1080/19393550802676097.
Full textProca, Maria, and Nicolae Panfilii. "The role of critical IT -infrastructures in ensuring national security." Moldoscopie, no. 2(99) (April 2024): 36–49. http://dx.doi.org/10.52388/1812-2566.2023.2(99).04.
Full textBoyle, Philip, and Tia Dafnos. "Infrastructures of Pacification: Vital Points, Critical Infrastructure, and Police Power in Canada." Canadian Journal of Law and Society / Revue Canadienne Droit et Société 34, no. 01 (2019): 79–98. http://dx.doi.org/10.1017/cls.2019.5.
Full textYigit, Yagmur, Mohamed Amine Ferrag, Mohamed C. Ghanem, et al. "Generative AI and LLMs for Critical Infrastructure Protection: Evaluation Benchmarks, Agentic AI, Challenges, and Opportunities." Sensors 25, no. 6 (2025): 1666. https://doi.org/10.3390/s25061666.
Full textDe Felice, Fabio, Ilaria Baffo, and Antonella Petrillo. "Critical Infrastructures Overview: Past, Present and Future." Sustainability 14, no. 4 (2022): 2233. http://dx.doi.org/10.3390/su14042233.
Full textFÎȚĂ, Nicolae Daniel, Sorin Mihai RADU, and Dragoș PĂSCULESCU. "THE RESILIENCE OF CRITICAL INFRASTRUCTURES WITHIN THE NATIONAL ENERGY SYSTEM IN ORDER TO ENSURE ENERGY AND NATIONAL SECURITY." BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY 11, no. 2 (2022): 57–67. http://dx.doi.org/10.53477/2284-9378-22-75.
Full textTurskis, Zenonas, Nikolaj Goranin, Assel Nurusheva, and Seilkhan Boranbayev. "A Fuzzy WASPAS-Based Approach to Determine Critical Information Infrastructures of EU Sustainable Development." Sustainability 11, no. 2 (2019): 424. http://dx.doi.org/10.3390/su11020424.
Full textLiu, Yiying, Guangxing Shan, Yucheng Liu, Abdullah Alghamdi, Iqbal Alam, and Sujit Biswas. "Blockchain Bridges Critical National Infrastructures: E-Healthcare Data Migration Perspective." IEEE Access 10 (2022): 28509–19. http://dx.doi.org/10.1109/access.2022.3156591.
Full textJohnson, Chris. "Socio-technical approaches to risk assessment in national critical infrastructures." Risk Management 11, no. 3-4 (2009): 155–58. http://dx.doi.org/10.1057/rm.2009.9.
Full textNewlove-Eriksson, Lindy, Giampiero Giacomello, and Johan Eriksson. "The Invisible Hand? Critical Information Infrastructures, Commercialisation and National Security." International Spectator 53, no. 2 (2018): 124–40. http://dx.doi.org/10.1080/03932729.2018.1458445.
Full textIura, Adrian. "Economic and Financial Elements of Critical Infrastructure Augmentation." International conference KNOWLEDGE-BASED ORGANIZATION 30, no. 2 (2024): 1–6. http://dx.doi.org/10.2478/kbo-2024-0051.
Full textStephens, Marion. "Unmasking the Subconscious Fallacies Within Critical Infrastructure Protection." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 752–58. http://dx.doi.org/10.34190/eccws.23.1.2213.
Full textOdumu, Wesley O., Barnabas I. Gwaivangmin, and Ademola P. Adewoye. "Safeguarding National Critical Energy Infrastructure using Cybersecurity Frameworks and Collaborative Approach for a Resilient Energy Future." NEWPORT INTERNATIONAL JOURNAL OF SCIENTIFIC AND EXPERIMENTAL SCIENCES 6, no. 1 (2025): 31–47. https://doi.org/10.59298/nijses/2025/61.3147.
Full textKohut, Yurii. "Measures for protection of the information systems of Ukraine’s critical infrastructures against cyberattacks." Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje 38, no. 38 (2020): 57–65. http://dx.doi.org/10.5604/01.3001.0014.5939.
Full textEismann, Christine. "Trends in Critical Infrastructure Protection in Germany." TRANSACTIONS of the VŠB – Technical University of Ostrava, Safety Engineering Series 9, no. 2 (2014): 26–31. http://dx.doi.org/10.2478/tvsbses-2014-0008.
Full textPöyhönen, Jouni, Viivi Nuojua, Martti Lehto, and Jyri Rajamäki. "Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organization." Information & Security: An International Journal 43, no. 2 (2019): 236–56. https://doi.org/10.11610/isij.4318.
Full textCîrdei, Ionuţ Alin. "Improving The Level of Critical Infrastructure Protection by Developing Resilience." Land Forces Academy Review 23, no. 4 (2018): 237–43. http://dx.doi.org/10.2478/raft-2018-0028.
Full textRavishankar, Monica, D. Vijay Rao, and C. R. S. Kumar. "A Game Theoretic Software Test-bed for Cyber Security Analysis of Critical Infrastructure." Defence Science Journal 68, no. 1 (2017): 54. http://dx.doi.org/10.14429/dsj.68.11402.
Full textZhu, Qianxiang, Yuanqing Qin, Yue Zhao, and Zhou Chunjie. "A hierarchical colored Petri net–based cyberattacks response strategy making approach for critical infrastructures." International Journal of Distributed Sensor Networks 16, no. 1 (2020): 155014771988980. http://dx.doi.org/10.1177/1550147719889808.
Full textRus, Simona, and Ana Ion. "Protecting The National And European Critical Underwater Infrastructures With The Help Of Divers." International conference KNOWLEDGE-BASED ORGANIZATION 21, no. 1 (2015): 105–14. http://dx.doi.org/10.1515/kbo-2015-0018.
Full textKalnawat, Aarti, Dharmesh Dhabliya, Kasichainula Vydehi, Anishkumar Dhablia, and Santosh D. Kumar. "Safeguarding Critical Infrastructures: Machine Learning in Cybersecurity." E3S Web of Conferences 491 (2024): 02025. http://dx.doi.org/10.1051/e3sconf/202449102025.
Full textUdeanu, Gheorghe. "Opinions Regarding The New Challenges To The Critical Infrastructures." International conference KNOWLEDGE-BASED ORGANIZATION 21, no. 1 (2015): 127–34. http://dx.doi.org/10.1515/kbo-2015-0021.
Full textJohnson, Chris W. "Anti-social networking: crowdsourcing and the cyber defence of national critical infrastructures." Ergonomics 57, no. 3 (2013): 419–33. http://dx.doi.org/10.1080/00140139.2013.812749.
Full textHuggett, Jeremy. "Deconstructing the Digital Infrastructures Supporting Archaeological Knowledge." Current Swedish Archaeology 31 (February 24, 2024): 11–38. http://dx.doi.org/10.37718/csa.2023.01.
Full textSZABÓ, Lajos, and Zsuzsanna BALOGH. "PREVENTIVE MEASURES OF INFRASTRUCTURES." Strategic Impact 80, no. 3 (2022): 62–72. http://dx.doi.org/10.53477/1841-5784-21-16.
Full textGerasymenko, O. M. "Critical infrastructure of Ukraine as a subject of scientific knowledge: theoretical aspect." Uzhhorod National University Herald. Series: Law 4, no. 85 (2024): 42–49. http://dx.doi.org/10.24144/2307-3322.2024.85.4.6.
Full textPepple, Peter, Ambrose Sunny Okorie, and Patrick Adeel. "Leveraging Artificial Intelligence for Enhancing the Resilience and Security of Critical Infrastructures in the United States." European Journal of Computer Science and Information Technology 13, no. 1 (2025): 16–32. https://doi.org/10.37745/ejcsit.2013/vol13n11632.
Full textTolіupa, Serhii, Anatoliy Shevchenko, and Andriy Kulko. "PECULIARITIES OF ENSURING THE SECURITY OF CRITICAL INFRASTRUCTURES." Information systems and technologies security, no. 1 (7) (2024): 11–23. http://dx.doi.org/10.17721/ists.2024.7.11-23.
Full textThurlby, Robert, and Kim Warren. "Understanding and managing the threat of disruptive events to the critical national infrastructure." Journal of Facilities Management 12, no. 3 (2014): 231–46. http://dx.doi.org/10.1108/jfm-04-2013-0020.
Full textPöyhönen, Jouni, and Martti Lehto. "Architecture Framework for Cyber Security Management." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 388–97. http://dx.doi.org/10.34190/eccws.23.1.2340.
Full textZaman, Dunya, and Mahdi Mazinani. "Cybersecurity in Smart Grids: Protecting Critical Infrastructure from Cyber Attacks." SHIFRA 2023 (August 18, 2023): 1–9. http://dx.doi.org/10.70470/shifra/2023/010.
Full textFita, Daniel N., Dan C. Petrilean, and Ioan L. Diodiu. "Analysis of the National Power Grid from Romania in the context of identifying vulnerabilities and ensuring energy security." Renewable Energies, Environment and Power Quality Journal 2 (July 2024): 210–16. http://dx.doi.org/10.24084/reepqj24.386.
Full textMészáros, István. "Comparison of the Protection of Critical Healthcare Infrastructures in Germany and Hungary." Hadmérnök 18, no. 4 (2023): 97–107. http://dx.doi.org/10.32567/hm.2023.4.7.
Full textThacker, Scott, Raghav Pant, and Jim W. Hall. "System-of-systems formulation and disruption analysis for multi-scale critical national infrastructures." Reliability Engineering & System Safety 167 (November 2017): 30–41. http://dx.doi.org/10.1016/j.ress.2017.04.023.
Full textFidelis, Chukwujekwu Obodoeze, Nkemdilim Obiokafor Ifeyinwa, and Chijindu Asogwa Tochukwu. "SCADA for National Critical Infrastructures Review of the Security Threats, Vulnerabilities and Countermeasures." International Journal of Trend in Scientific Research and Development 2, no. 2 (2018): 974–82. https://doi.org/10.31142/ijtsrd9556.
Full textRezvani, Seyed M. H. S., Maria João Falcão Silva, and Nuno Marques de Almeida. "Mapping Geospatial AI Flood Risk in National Road Networks." ISPRS International Journal of Geo-Information 13, no. 9 (2024): 323. http://dx.doi.org/10.3390/ijgi13090323.
Full textCypkina, A. V., and A. V. Shaburova. "Categorization of CII objects in the defense industry." Interexpo GEO-Siberia 6 (May 18, 2022): 288–93. http://dx.doi.org/10.33764/2618-981x-2022-6-288-293.
Full textNikolaou, Nikolaos, Andreas Papadakis, Konstantinos Psychogyios, and Theodore Zahariadis. "Vulnerability Identification and Assessment for Critical Infrastructures in the Energy Sector." Electronics 12, no. 14 (2023): 3185. http://dx.doi.org/10.3390/electronics12143185.
Full textBhemavarapu, Sai Varun Reddy, and Agathamudi Vikram Naidu. "INVESTIGATING A NATION-SPONSORED CYBER ATTACK ON CRITICAL INFRASTRUCTURE: CASE STUDY AND ANALYSIS STUXNET WORM." International Journal of Engineering Applied Sciences and Technology 9, no. 09 (2025): 78–83. https://doi.org/10.33564/ijeast.2025.v09i09.013.
Full text