scispace - formally typeset
Search or ask a question

Showing papers in "International Journal of Critical Infrastructure Protection in 2010"


Journal ArticleDOI
TL;DR: A semantic model for information flow analysis in a cyber–physical systems (CPS) is presented and an approach to perform the analysis, including both trace-based analysis and automated analysis through process algebra specification, is described.

144 citations


Journal ArticleDOI
Tyler Moore1
TL;DR: The various economic challenges plaguing cybersecurity in greater detail are outlined: misaligned incentives, information asymmetries and externalities, and the regulatory options that are available to overcome these barriers in the cybersecurity context are discussed.

109 citations


Journal ArticleDOI
TL;DR: Mapping the different sector definitions of security and safety in the SEMA framework makes their respective meanings explicit and reveals inconsistencies and overlaps.

93 citations


Journal ArticleDOI
TL;DR: It was found that if indirect losses (such as business interruption, loss of GDP, etc.) are considered, then CT protective measures are cost-effective even if the terrorist threat probability is not high, which makes CT Protective measures less cost- effective.

71 citations


Journal ArticleDOI
TL;DR: This paper presents an agent- based input–output inoperability model designed to overcome the limitations of the holistic and agent-based paradigms and provides a detailed and expressive framework for critical infrastructures modeling and analysis.

64 citations


Journal ArticleDOI
TL;DR: This paper considers the problem of allocating finite resources among the elements of a critical infrastructure system in order to protect it from antagonistic attacks.

49 citations


Journal ArticleDOI
TL;DR: The GSM-R vulnerabilities due to wireless interference are examined and an innovative monitoring system based on software-defined radio technology that is designed for the early detection of wireless interference is described.

43 citations


Journal ArticleDOI
TL;DR: A framework for quantifying the risk induced by the potential for cyber attacks levied against network-supported operations and a formal assessment of candidate risk management policies that address network host vulnerabilities and host-process coupling are presented.

24 citations



Journal ArticleDOI
TL;DR: Authentication protocols for use in long-lived process control systems address the issue of longevity by defining, as part of the protocol suites, a means for the cryptographic components of the authentication system to be replaced dynamically and securely.

13 citations


Journal ArticleDOI
TL;DR: This paper presents a strategy for cyberspace health that is inspired by constructs and initiatives in the public health domain, and has five components: sanitizing the environment, controlling community infections, educating the actors, organizing detection and prevention services, and creating the social machinery for cybspace health.

Journal ArticleDOI
TL;DR: An agent-based modeling technique demonstrates that social network topology may influence policy measures designed to induce tipping and cascading in cyber security investments.

Journal ArticleDOI
TL;DR: The modeling of a region as a system that has imperfect information about itself and an imperfect ability to discern its future infrastructure conditions is explored, demonstrating the importance of information and information processes in evaluating regional risk and capability.

Journal ArticleDOI
TL;DR: There are some ongoing efforts regarding transition emergency service architectures that could introduce security vulnerabilities unless countermeasures are developed, and the ongoing work in providing cryptographic assertions for location is summarized.


Journal ArticleDOI
TL;DR: The legal issues related to government-mandated computer inoculations are analyzed, drawing on case law related to mandatory medical inoculations and treatment, where the concept of “general welfare” generally overrides individual freedoms.