Showing papers in "International Journal of Critical Infrastructure Protection in 2010"
••
TL;DR: A semantic model for information flow analysis in a cyber–physical systems (CPS) is presented and an approach to perform the analysis, including both trace-based analysis and automated analysis through process algebra specification, is described.
144 citations
••
TL;DR: The various economic challenges plaguing cybersecurity in greater detail are outlined: misaligned incentives, information asymmetries and externalities, and the regulatory options that are available to overcome these barriers in the cybersecurity context are discussed.
109 citations
••
TL;DR: Mapping the different sector definitions of security and safety in the SEMA framework makes their respective meanings explicit and reveals inconsistencies and overlaps.
93 citations
••
TL;DR: It was found that if indirect losses (such as business interruption, loss of GDP, etc.) are considered, then CT protective measures are cost-effective even if the terrorist threat probability is not high, which makes CT Protective measures less cost- effective.
71 citations
••
TL;DR: This paper presents an agent- based input–output inoperability model designed to overcome the limitations of the holistic and agent-based paradigms and provides a detailed and expressive framework for critical infrastructures modeling and analysis.
64 citations
••
TL;DR: This paper considers the problem of allocating finite resources among the elements of a critical infrastructure system in order to protect it from antagonistic attacks.
49 citations
••
TL;DR: The GSM-R vulnerabilities due to wireless interference are examined and an innovative monitoring system based on software-defined radio technology that is designed for the early detection of wireless interference is described.
43 citations
••
TL;DR: A framework for quantifying the risk induced by the potential for cyber attacks levied against network-supported operations and a formal assessment of candidate risk management policies that address network host vulnerabilities and host-process coupling are presented.
24 citations
••
20 citations
••
TL;DR: Authentication protocols for use in long-lived process control systems address the issue of longevity by defining, as part of the protocol suites, a means for the cryptographic components of the authentication system to be replaced dynamically and securely.
13 citations
••
TL;DR: This paper presents a strategy for cyberspace health that is inspired by constructs and initiatives in the public health domain, and has five components: sanitizing the environment, controlling community infections, educating the actors, organizing detection and prevention services, and creating the social machinery for cybspace health.
••
TL;DR: An agent-based modeling technique demonstrates that social network topology may influence policy measures designed to induce tipping and cascading in cyber security investments.
••
TL;DR: The modeling of a region as a system that has imperfect information about itself and an imperfect ability to discern its future infrastructure conditions is explored, demonstrating the importance of information and information processes in evaluating regional risk and capability.
••
TL;DR: There are some ongoing efforts regarding transition emergency service architectures that could introduce security vulnerabilities unless countermeasures are developed, and the ongoing work in providing cryptographic assertions for location is summarized.
••
••
TL;DR: The legal issues related to government-mandated computer inoculations are analyzed, drawing on case law related to mandatory medical inoculations and treatment, where the concept of “general welfare” generally overrides individual freedoms.