CIPRNet Bibliography of CIP literature
2017 |
Protection of Critical Infrastructure in the event of Earthquakes: CIPCast-ES
ANIDIS 2017 - XVII Convegno
, page 9.
Pistoia, Italy
September
2017
Keywords: Seismic risk and vulnerability, Critical infrastructures, Determistic scenarios, Decision Support Systems DSS, Physical damage and Functional impacts Abstract: This paper presents a novel decision support system for the assessment and mitigation of seismic risk for Critical Infrastructures (CI). The tool, named CIPCast-ES, was developed by ENEA in the framework of the EU-funded CIPRNet project. CIPCast-ES provides a user-friendly geographical interface for querying and analysing data, producing and evaluating scenarios, through the deterministic assessment of the expected physical damage to CI components and the induced impacts for both real and simulated seismic events. A novel contribution introduced in CIPCast-ES, compared to similar simulation platforms, is the integration, in a unique framework, of: (i) real-time acquisition of earthquake events (source: INGV); (ii) seismic fragility assessment of the different components for the different CI systems considered; (iii) estimation of damage and impact scenarios; (iv) estimation of restoration times for CI services and informed support for an optimal allocation of resources. The paper presents the data model that was specifically designed to account for topological and system performance properties and the adopted metrics used to assess CI seismic vulnerability, damage and service impacts. An implementation of CIPCast-ES related to a seismic event in Central Italy affecting the inhabited area of Rome and its Distribution Electric Power Network is presented and discussed in the paper |
2016 |
Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures
International Journal of Critical Infrastructure Protection,
12:46 - 60
2016
ISSN: 1874-5482 Keywords: Critical infrastructures; Cascading failures; Dependency risk graphs; Time analysis; Resilience; Fuzzy logic Abstract: Abstract Dependency analysis of critical infrastructures is a computationally intensive problem when dealing with large-scale, cross-sectoral, cascading and common-cause failures. The problem intensifies when attempting a dynamic, time-based dependency analysis. This paper extends a previous graph-based risk analysis methodology to dynamically assess the evolution of cascading failures over time. Various growth models are employed to capture slow, linear and rapidly evolving effects, but instead of using static projections, the evolution of each dependency is "objectified" by a fuzzy system that also considers the effects of nearby dependencies. To achieve this, the impact (and, eventually, risk) of each dependency is quantified on the time axis into a form of many-valued logic. In addition, the methodology is extended to analyze major failures triggered by concurrent common-cause cascading events. A critical infrastructure dependency analysis tool, CIDA, that implements the extended risk-based methodology is described. CIDA is designed to assist decision makers in proactively analyzing dynamic and complex dependency risk paths in two ways: (i) identifying potentially underestimated low risk dependencies and reclassifying them to a higher risk category before they are realized; and (ii) simulating the effectiveness of alternative mitigation controls with different reaction times. Thus, the CIDA tool can be used to evaluate alternative defense strategies for complex, large-scale and multi-sectoral dependency scenarios and to assess their resilience in a cost-effective manner. |
2015 |
Cyber (In-)security of Industrial Control Systems: A Societal Challenge
In F. Koornneef and C. van Gulijk, editor,
Computer Safety, Reliability, and Security: 34th International Conference, SAFECOMP2015, Delft, The Netherlands, September 23-25, 2015 Proceedings
of LNCS
, page 7-15.
EWICS TC7
Publisher: Springer,
September
2015
|
Building Public Private Cooperation in Cyber Security
The CIP Report,
14(8):11-12
May
2015
|
CIPedia©: A Critical Infrastructure Protection and Resilience Resource
The CIP Report,
14(8):3-5
May
2015
|
Sharing Cyber Security Information
Publisher: TNO, The Hague, The Netherlands
March
2015
Keywords: Information Sharing,cyber security |
Cyber Security of Industrial Control Systems
The Hague, The Netherlands
March
2015
Keywords: SCADA, ICS, security |
Advanced services for critical infrastructures protection
Journal of Ambient Intelligence and Humanized Computing,
:1-13
2015
ISSN: 1868-5137 Keywords: Critical infrastructure protection; CIPRNet project; Decision support; Services; Modelling and simulation |
Symposium on Critical Infrastructures: Risk, Responsibility and Liability - Governing Critical ICT: Elements that Require Attention
European Journal of Risk Regulation,
6(2):263 - 270
2015
ISBN: 1867-299X Abstract: With respect to critical information and communication technologies (ICT), nations most often declare their national critical infrastructure to include telecommunication services and in some cases critical services offered by key Internet Service Providers (ISP). This paper debates whether nations, their policy-makers, legislation and regulation largely overlook and fail to properly govern the full set of ICT elements and services critical to the functioning of their nation. The related societal and economical risk, however, needs to be closely mitigated, managed and governed. Legal and regulatory obligations to increase the ICT resilience may sometimes encourage this process. |
ARIMA-Based Modeling and Validation of Consumption Readings in Power Grids
10th Int. Conf. on Critical Information Infrastructure Security (CRITIS 2015),
2015
Keywords: smart, meter, anomaly, attack, detection, auto, regressive, moving, average, integrated, electricity, theft, cyber-physical, ARIMA, ARMA, forecasting, critical, infrastructure, security, measurements Abstract: Smart meters are increasingly being deployed to measure electricity consumption of residential as well as non-residential consumers. The readings reported by these meters form a time series, which is stored at electric utility servers for billing purposes. Invalid readings may be reported because of malicious compromise of the smart meters themselves, or of the network infrastructure that supports their communications. Although many of these meters come equipped with encrypted communications, they may potentially be vulnerable to cyber intrusions. Therefore, there is a need for an additional layer of validation to detect these intrusion attempts. In this paper, we make three contributions. First, we show that the ARMA model proposed in the anomaly detection literature is unsuitable for electricity consumption as most consumers exhibit non-stationary consumption behavior. We use automated model fitting methods from the literature to show that first-order differencing of these non-stationary readings makes them weakly stationary. Thus, we propose the use of ARIMA forecasting methods for validating consumption readings. Second, we evaluate the effectiveness of ARIMA forecasting in the context of a specific attack model, where smart meter readings are modifed to steal electricity. Third, we propose additional checks on mean and variance that can mitigate the total amount of electricity that can be stolen by an attacker by 77:46%. Our evaluation is based on a real, open dataset of readings obtained from 450 consumer meters. Note: Winning artcle od the 2015 CIPRNet Young CRITIS Award (CYCA) |
Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems
In Elias Kyriakides and Marios Polycarpou, editor,
Volume 565
of Studies in Computational Intelligence
Publisher: Springer, Berlin Heidelberg
2015
Keywords: Critical Infrastructure Protection, Transportation Systems, Electricity Networks, Risk Assessment, Monitoring, Control Security |
2014 |
Klimaatadaptatie en de sector Informatie- en CommunicatieTechnologie (ICT) report Document number: TNO rapport 2014 R112943
TNO, TNO Den Haag
September
2014
Keywords: Climate adaptation,ICT,infrastructure |
Klimaatadaptatie en energie-infrastructuur report Document number: TNO rapport 2014 R11294
TNO, TNO Den Haag
September
2014
Keywords: Climate adaptation,energy,infrastructure |
Critical Infrastructure Online Fault Detection: Application in Water Supply Systems
9th Int. Conf. on Critical Information Infrastructure Security (CRITIS 2014),
2014
Keywords: critical infrastructures, water supply systems, fault detection, testbed, modelling, discrete-time systems Abstract: In this paper we first introduce a testbed that is able to emulate the operation and common faults of a water supply system, as well as its interaction with a SCADA system. Then we implement an online fault detection algorithm based on a fault diagnosis architecture for nonlinear uncertain discrete-time systems, that we apply and test with the testbed. We finally present some experimental results illustrating the effectiveness of this approach. Note: Winning artcle od the 2014 CIPRNet Young CRITIS Award (CYCA) |
Are we in love with cyber insecurity?
International Journal of Critical Infrastructure Protection,
7(3):165 - 166
2014
ISSN: 1874-5482 |
Chapter 3 - New and emerging threats of cyber crime and terrorism
:19 - 29
2014
ISBN: 978-0-12-800743-3 Keywords: Cyber security |
Chapter 2 - Definitions of Cyber Terrorism
:11 - 17
2014
ISBN: 978-0-12-800743-3 Keywords: Cyber terror |
Analysing Critical Infrastructure Failure With a Resilience Inoperability Input--Output Model
Economic Systems Research,
26(1):39
2014
|
Trust building and the European Reference Network for Critical Infrastructure Protection community
International Journal of Critical Infrastructure Protection,
7(3):193
2014
|
Organisational Structures & Considerations
:108 - 145
2014
ISBN: 978-9949-9211-1-9 978-9949-9211-2-6 978-9949-9211-3-3 |
An ontology framework for flooding forecasting
The 14th International Conference on Computational Science and Its Applications (ICCSA 2014)
2014
|
End-users needs and requirements for tools to support critical infrastructures protection
The 1st International Workshop on Real-time Big Data Analytics for Critical Infrastructure Protection (BIG4CIP 2014)
Newcastle, the UK
2014
|
A Decision Support System for Emergency Management of Critical Infrastructures subjected to Natural Hazards
9th Int. Conf. on Critical Information Infrastructure Security (CRITIS 2014)
2014
|
Extension of DMCI to heterogeneous infrastructures:model and pilot application
In PSAM, editor,
Probabilistic Safety Assessment & Management conference PSAM 12 June 2014, Honolulu, Hawaii
2014
|
A global approach to risk assessment of critical infrastructures
Proc. The 22nd Society for Risk Analysis Europe Conference (SRA-E 2013)
2014
Note: Conference: Trondheim, Norway, June 17-19, 2013 |
Towards a decision support system for consequence analysis of flooding on critical infrastructure
Proc. The 11th International Conference on Hydroinformatics (HIC 2014)
2014
Note: Conference: New York, USA; Aug 17-21, 2014 |
Towards Testing Critical Infrastructure Resilience EUR - Scientific and Technical Research Reports
European Commission, Joint Research Center,
2014
|
A software module for simulating control actions on ICT controlled distributed power grids
JRC92427,
2014
|
Resilience Assessment of ICT controlled distributed power grid
JRC92359,
2014
|
Geomagnetically induced Currents and Power Grids: A case study using GRRASP Document number: JRC 90792
European Commission,
2014
|
GRRASP: Geospatial Risk and Resilience Analysis Platform - Version 2.0
JRC90531,
2014
|
2013 |
Nineteen national cyber security strategies
IJCIS,
9(1/2):3
2013
|
Next Generation Information-Based Infrastructures: New Dependencies and Threats
Critical Information Infrastructure Protection and Resilience in the {ICT} Sector,
:304-317
2013
|
Cascading Effects of Common-Cause Failures in Critical Infrastructures
IFIP Advances in Information and Communication Technology,
:171
2013
ISSN: 1868-422X ISBN: http://id.crossref.org/isbn/978-3-642-45330-4 |
Assessing n-order dependencies between critical infrastructures
International journal of critical infrastructures,
9(1):93
2013
|
Chemical and Biological Risks in the Water Sector--a Thematic Area in the European Commission's Erncip
2013
|
European reference network for critical infrastructure protection
International journal of critical infrastructure protection,
6(1):51
2013
|
Why are we so unconsciously insecure?
International Journal of Critical Infrastructure Protection,
6(3):179 - 181
2013
ISSN: 1874-5482 |
Intersectorale afhankelijkheden: buitenlandse methoden en mogelijke toepasbaarheid in Nederland
Publisher: TNO, The Hague, Netherlands
2013
|
Analysis of Severe Space Weather on Critical Infrastructures
In Eric Luiijf and Pieter Hartel (eds), editor,
Critical Information Infrastructure Security - 8th International Workshop, (CRITIS'13) Volume 8328
of LNCS
, page 62-73.
Publisher: Springer, Dordrecht
2013
|
Plug and play, approximation-based, selective load shedding mechanism for the future electrical grid
In E. Luiijf and P. Hartel, editor,
Critical Information Infrastructure Security - 8th International Workshop (CRITIS'13) Volume 8328
, page 74-83.
Publisher: Springer, Dordrecht, Amsterdam, The Netherlands
2013
|
Security Challenges for Cooperative and Interconnected Mobility Systems
In Luiijf E., Hartel P., editor,
Critical Information Infrastructure Security - 8th International Workshop (CRITIS'13) Volume 8328
, page 1-15.
Publisher: Springer, Dordrecht, Amsterdam, The Netherlands
2013
|
Modellierung, Simulation und Analyse für den Schutz Kritischer Infrastrukturen
Tagungsband 61. Jahresfachtagung der Vereinigung des Deutsches Brandschutzes e.V.,
, page 569-586.
Weimar, Germany
2013
|
Current Cyber Security Threats and Challenges in Critical Infrastructures Protection
The Second International Conference on Informatics and Applications
, page 93-97.
ICIA2013
Lodz, Poland
2013
|
Expand the Crisis? Neglect Critical Infrastructure!
Tagungsband 61. Jahresfachtagung der Vereinigung des Deutsches Brandschutzes e.V.
, page 293-304.
Weimar, Germany
2013
|
Risk Assessment of Multi-Order Dependencies between Critical Information and Communication Infrastructures
Critical Information Infrastructure Protection and Resilience in the ICT Sector
page 153.
Publisher: IGI Global,
2013
ISBN: http://id.crossref.org/isbn/9781466629653 |
Interdependencies between critical infrastructures: Analyzing the risk of cascading effects
Critical Information Infrastructure Security
page 104.
Publisher: Springer,
2013
|
Critical Information Infrastructure Security - 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers
In Sandro Bologna and Bernhard M. Hämmerli and Dimitris Gritzalis and Stephen D. Wolthusen, editor,
Volume 6983
of Lecture Notes in Computer Science
Publisher: Springer,
2013
ISBN: 978-3-642-41475-6 |
Network of Networks: The Last Frontier of Complexity
In D'Agostino, Gregorio and Scala, Antonio, editor,
Volume XII
of Understanding Complex Systems
Publisher: Springer, Cham Heidelberg New York Dordrecht London
2013
ISBN: 978-3-319-03517-8 Note: Proceedings, 340 pages. Conference: Copenhagen, Denmark, June 3-4, 2013 |
8th International Conference on Critical Information Infrastructure Security (CRITIS'13)
Publisher: TNO, The Hague
2013
Keywords: Critical Infrastructure Protection, Critical Information Infrastructures, Information Systems, Networks, Risk Assessment, Security Note: Pre-proceedings, 231 pages. Amsterdam, The Netherlands, September 16-18, 2013 |
Critical Information Infrastructure Security - 8th International Workshop (CRITIS'13)
Volume 8328
of LNCS, subseries Security and Cryptology
Publisher: Springer, Cham Heidelberg New York Dordrecht London
2013
ISBN: 978-3-319-03963-3 Keywords: Critical Infrastructure Protection, Critical Information Infrastructures, Information Systems, Networks, Risk Assessment, Security Note: Proceedings, 219 pages. Workshop: Amsterdam, The Netherlands, September 16-18, 2013 |
Optimization Models in a Smart Tool for the Railway Infrastructure Protection
In Eric Luiijf and Pieter Hartel, editor,
Critical Information Infrastructure Security - 8th International Workshop, (CRITIS'13)
Volume 8328
of LNCS
, page 191-196.
Publisher: Springer, Dordrecht
2013
|
Federated Modelling and Simulation for Critical Infrastructure Protection
In Gregorio D'Agostino and Antonio Scala, editor,
Network of Networks: The Last Frontier of Complexity
Volume XII
of Understanding Complex Systems
, page 225-253.
Publisher: Springer, Cham Heidelberg New York Dordrecht London
2013
ISBN: 978-3-319-03517-8 Note: Proceedings, 340 pages. Conference: Copenhagen, Denmark, June 3-4, 2013 |
GRRASP: Geospatial Risk and Resilience Assessment Platform
JRC 86306,
2013
|
European CIP-related Testing Capabilities: Gaps and Challenges EUR - Scientific and Technical Research Reports Document number: JRC85192
European Commission, Joint Research Center,
2013
|
Risk Assessment Methodology for Critical Infrastructure Protection Document number: JRC78292
European Commission,
2013
|
Overview of disaster risks that the EU faces internal assessment based on JRC databases EUR - Scientific and Technical Research Reports Document number: JRC79415
European Commission, Joint Research Center,
2013
|
A modular dynamic model for interdependencies assessment of critical infrastructures Document number: JRC87615
European Commission,
2013
|
http://crutial.erse-web.it/ Note: last accessed 2013-01-11 |
http://www.diesis-project.eu Note: last accessed 2013-01-15 |
http://www.openmi.org Note: last accessed 2013-01-16 |
http://www.sandia.gov/nisac Note: Last accessed 2013-01-16 |
http://www.irriis.org Note: last accessed 2013-01-15 |
2012 |
NCSWT: An integrated modeling and simulation tool for networked control systems
Simulation Modelling Practice and Theory,
27:90-111
2012
|
Critical Infrastructure Protection - Information Infrastructure Models, Analysis, and Defense
In Javier Lopez and Roberto Setola and Stephen D. Wolthusen, editor,
Volume 7130
of Lecture Notes in Computer Science
Publisher: Springer,
2012
ISBN: 978-3-642-28919-4 |
Understanding Cyber Threats and Vulnerabilities.
In Lopez, Javier and Setola, Roberto and Wolthusen, Stephen D., editor,
Critical Infrastructure Protection Volume 7130
of Lecture Notes in Computer Science
page 52-67.
Publisher: Springer,
2012
ISBN: 978-3-642-28919-4 Keywords: dblp |
Establishment of the European Reference Network for Critical Infrastructure Protection (ERNCIP)
page 273.
Publisher: Springer Science + Business Media,
2012
ISBN: http://id.crossref.org/isbn/978-3-642-33161-9 |
Securing transportation-critical infrastructures: Trends and perspectives
Global Security, Safety and Sustainability & e-Democracy
page 171.
Publisher: Springer,
2012
|
Regional economic assessment of Critical Infrastructure failure in the EU: A combined systems engineering and economic model
ERSA conference papers
European Regional Science Association
2012
|
Generic Methodology for Verification and Validation (GM-VV) to Support Acceptance of Models, Simulations and Data
SISO,
2012
|
Development of the Critical Infrastructure Risk and Resilience Platfrorm: THE CIR2
Institute for Security and Protection of the citizen,
2012
|
Risk Assessment Methodologies for Critical Infrastructure Protection. Part I: A state of the art Document number: EUR 25286
European Commission,
2012
|
Interdependencies and Resilience assessment methodology for CI
Joint Research Centre, Institute for Security and Protection of the citizen,
2012
Keywords: Resilience, Critical Infrastructures |
Policy support to the review of the EPCIP Directive: Lessons learned
JRC 78051,
2012
|
2011 |
RECIPE: Good Practices Manual for CIP Policies
Publisher: TNO, The Hague, Netherlands
July
2011
|
The State and the Threat of Cascading Failure across Critical Infrastructures: The Implications of Empirical Evidence from Media Incident Reports
Public Administration,
89(2):381
2011
|
Risk assessment methodology for interdependent critical infrastructures
International Journal of Risk Assessment and Management,
15(2):128
2011
|
Assessing and improving SCADA security in the Dutch drinking water sector
International Journal of Critical Infrastructure Protection,
4(3):124 - 134
2011
ISSN: 1874-5482 Keywords: Drinking water Abstract: International studies have shown that information security for process control systems, in particular SCADA, is weak. Many of the critical infrastructure (CI) services critically depend on process control systems. Therefore, any vulnerability in the protection of process control systems in CI may result in serious consequences for citizens and society. In order to understand their sector-wide security posture, the drinking water sector in The Netherlands benchmarked the information security of their process control environment. Large differences in the individual security postures of the ten drinking water companies were found. Good Practices for SCADA security were developed based upon the benchmark results. This paper discusses the simple but effective approach taken to perform the benchmark, the way the results were reported to the drinking water companies, and the way in which the SCADA information security good practices were developed. Apart from some high-level indications of areas requiring more security attention, no actual security posture results are presented in this paper since the study data contain company and national sensitive information. For the same reason, the figures in this paper are based on artificial data. |
Linking SWAT and SOBEK using open modeling interface (OpenMI) for sediment transport simulation in the Blue Nile River Basin
Trans. of the ASABE,
54(5):1749-1757
2011
|
Quantitative estimates of critical infrastructures' interdependencies on the communication and information technology infrastructure
IJCIS,
7(3):220-242
2011
|
A hybrid systems model to simulate cyber interdependencies between critical infrastructures
IJCIS,
7(4):265-288
2011
|
Ten National Cyber Security Strategies: A Comparison
Critical Information Infrastructure Security - 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers
, page 1.
2011
|
Protecting Critical Infrastructure in the EU Document number: CEPS Task Force Report
Centre for European Policy Studies, Brussels
2011
|
2010 |
Canvassing the Cyber Security Landscape: Why Energy Companies Need to Pay Attention
Journal on Energy Security,
May
2010
|
An ontological approach to simulate critical infrastructures
Journal of Computational Science,
1(4):221-228
2010
ISSN: 1877-7503 Keywords: Ontology |
Using ontologies for the federated simulation of critical infrastructures
Procedia Computer Science,
1(1):2301-2309
2010
ISSN: 1877-0509 Keywords: Ontology |
A multi-layer criticality assessment methodology based on interdependencies
Computers & Security,
29(6):643
2010
|
An international tabletop exercise on critical infrastructure protection: the lessons identified
IJCIS,
6(3):293
2010
|
A structured approach to identifying European critical infrastructures
IJCIS,
6(3):277-292
2010
|
Infrastructure modelling 2.0
IJCIS,
6(2):168-186
2010
|
Modelling and simulation for critical infrastructure interdependency assessment: a meta-review for model characterisation
IJCIS,
6(4):363-379
2010
|
UML-CI: A Reference Model for Profiling Critical Infrastructure Systems
Information Systems Frontiers Journal,
12(2):115-139
2010
|
Ontological Framework to Model Critical Infrastructures and their Interdependencies
Complexity in Engineering,
0:91-93
2010
ISBN: 978-0-7695-3974-4 Note: Conference: Workshop on Complexity in Engineering (COMPENG 2010), Rome, Italy, Feb 22-24, 2010 |
Using situational simulations to support decision making in co-dependent infrastructure systems
IJCIS,
6(1):52-72
2010
|
Empirical findings on European critical infrastructure dependencies
Int. J. of System of Systems Engineering,
2(1):3-18
2010
|
Design of a Mobile Agent-Based Adaptive Communication Middleware for Federations of Critical Infrastructure Simulations
In Rome, Erich and Bloomfield, Robin, editor,
Critical Information Infrastructures Security Volume 6027
of Lecture Notes in Computer Science
page 34-49.
Publisher: Springer Berlin Heidelberg,
2010
ISBN: 978-3-642-14378-6 |
Computer Safety, Reliability, and Security, 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010. Proceedings
In Erwin Schoitsch, editor,
Volume 6351
of Lecture Notes in Computer Science
Publisher: Springer,
2010
ISBN: 978-3-642-15650-2 |
Process Control Security: Go Dutch! (United, Shared, Lean and Mean)
Computer Safety, Reliability, and Security, 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010. Proceedings
, page 483.
2010
|
The DIESIS approach to semantically interoperable federated critical infrastructure simulation
In Edward Williams, editor,
SIMUL 2010: the second International Conference on Advances in System Simulation
, page 121-128.
Publisher: IEEE Computer Society, Conference: 22-27 August 2010, Nice, France
2010
|
http://www.simtec-gmbh.at/sites\_en/sincal.asp
SIEMENS,
2010
Note: last accessed 2010-05-05 |
DIESIS final report publishable summary
Fraunhofer IAIS, Sankt Augustin, Germany
2010
|
http://www.opentrack.ch/ Note: last accessed 2010-05-05 |
http://www.isi.edu/nsnam/ns/ Note: last accessed 2010-05-05 |
2009 |
Security and Privacy Challenges in the Smart Grid
IEEE Security & Privacy Magazine,
2009
|
Critical Infrastructures Ontology based Modelling and Simulation
Proc. 3rd Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, NH, USA,
2009
|
An Integrated Approach For Simulating Interdependencies
In Papa, Mauricio and Shenoi, Sujeet, editor,
Critical Infrastructure Protection II Volume 290
of The International Federation for Information Processing
page 229-239.
Publisher: Springer US,
2009
ISBN: 978-0-387-88522-3 Keywords: Heterogeneous infrastructures; interdependencies; simulation |
Enabling System of Systems Analysis of Critical Infrastructure Behaviors
In Setola, Roberto and Geretshuber, Stefan, editor,
Critical Information Infrastructure Security
page 24-35.
Publisher: Springer-Verlag, Berlin, Heidelberg
2009
ISBN: 978-3-642-03551-7 |
An Integrated Methodology For Critical Infrastructure Modeling And Simulation
In Papa, Mauricio and Shenoi, Sujeet, editor,
Critical Infrastructure Protection II Volume 290
of The International Federation for Information Processing
page 257-268.
Publisher: Springer US,
2009
ISBN: 978-0-387-88522-3 Keywords: Modeling; simulation; geospatial analysis; ontological analysis |
Risk-based criticality analysis
Critical infrastructure protection III
page 35-49.
Publisher: Springer Science + Business Media,
2009
ISBN: http://id.crossref.org/isbn/978-3-642-04798-5 |
Ontology-Based Critical Infrastructure Modeling and Simulation
In Palmer, Charles and Shenoi, Sujeet, editor,
Critical Infrastructure Protection III Volume 311
of IFIP Advances in Information and Communication Technology
page 229-242.
Publisher: Springer Berlin Heidelberg,
2009
ISBN: 978-3-642-04797-8 Keywords: Modeling; simulation; ontology; federated environment |
Empirical Findings on Critical Infrastructure Dependencies in Europe
In Setola, Roberto and Geretshuber, Stefan, editor,
Critical Information Infrastructure Security Volume 5508
of LNCS
page 302-310.
Publisher: Springer Berlin Heidelberg,
2009
ISBN: 978-3-642-03551-7 |
Critical Information Infrastructure Security, Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008. Revised Papers
In Roberto Setola and Stefan Geretshuber, editor,
Volume 5508
of Lecture Notes in Computer Science
Publisher: Springer,
2009
ISBN: 978-3-642-03551-7 |
Critical Infrastructure Protection II - Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers
In Mauricio Papa and Sujeet Shenoi, editor,
Volume 290
of IFIP Advances in Information and Communication Technology
Publisher: Springer,
2009
ISBN: 978-0-387-88522-3 |
4th International Workshop on Critical Information Infrastructure Security (CRITIS'09)
In Rome, Erich and Bloomfield, Robin, editor,
of LNCS Fraunhofer IAIS
Publisher: Springer, Sankt Augustin
2009
Keywords: Critical Infrastructure Protection, Critical Information Infrastructures, Information Systems, Networks, Risk Assessment, Security |
Insufficient Situational Awareness about Critical Infrastructures by Emergency Management
Proceedings of the NATO Symposium on C3I for crisis, emergency and consequence management, Bucharest 11-12 May 2009, RTO-MP-IST-086
Publisher: NATO RTA,
2009
|
Design of a Mobile Agent-Based Adaptive Communication Middleware to Enable Federations of Critical Infrastructure Simulations
4th Int'l Workshop on Critical Information Infrastructures Security (CRITIS'09), Bonn
, page 145-160.
2009
|
DIESIS - Design of an Interoperable European Federated Simulation Network for Critical Infrastructures
Proc. 2009 SISO European Simulation Interoperability Workshop (ESIW '09), Istanbul, Turkey
, page 139-146.
2009
|
Information Modelling and Simulation in large interdependent Critical Infrastructures
In Setola, Roberto (Ed.) et al., editor,
Proceedings of 3rd International Workshop on Critical Information Infrastructures Security (CRITIS '08)
Volume 5508
of LNAI
, page 36-47.
Publisher: Springer-Verlag, Berlin
2009
|
Modelling and Simulation of Interdependencies between the Communication and Information Technology Infrastructure and other Critical Infrastructures
The University of British Columbia, Vancouver, BC, Canada
2009
|
DIESIS Deliverable D4.2a: Proof of concept
ENEA,
2009
|
Council Regulation (EC) No 723/2009 of 25 June 2009 on the Community legal framework for a European Research Infrastructure Consortium (ERIC) OJEU Document number: 1
European Commission,
2009
|
DIESIS Deliverable D2.2: Technology analysis and assessment
CRIAI,
2009
|
Infrastructure interdependency analysis: Requirements, capabilities and strategy Document number: D/418/12101/3
Adelard LLP, London, UK
2009
|
DIESIS Deliverable D4.1b: architectural design
Fraunhofer IAIS,
2009
|
2008 |
Simulating interdependent Critical Infrastructures with SimCIP
European CIIP Newsletter,
4(3):6-8
2008
|
Modelling interdependent infrastructures using interacting dynamical models
Int. J. of Critical Infrastructures,
4(1/2):63-79
2008
|
R&D activities in Europe on Critical Information Infrastructure Protection (CIIP)
Int. Journal of Systems of Systems Engineering,
1:257
2008
|
Extensible threat taxonomy for critical infrastructures
IJCIS,
4(4):409
2008
|
The state of the art in critical infrastructure protection: a framework for convergence
Int. J. of Critical Infrastructures,
4(3):215-244
2008
|
A Middleware Improved Technology (MIT) to mitigate interdependencies between Critical Infrastructures
In Rogério de Lemos and Felicita Giandomenico and Cristina Gacek and Henry Muccini and Marlon Vieira, editor,
Architecting Dependable Systems V Volume 5135
of LNCS
Publisher: Springer, Berlin / Heidelberg
2008
ISBN: 978-3540855705 |
Critical Information Infrastructures Security, Second International Workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007. Revised Papers
In Javier Lopez and Bernhard M. Hämmerli, editor,
Volume 5141
of Lecture Notes in Computer Science
Publisher: Springer,
2008
ISBN: 978-3-540-89095-9 |
Assessing and Improving SCADA Security in the Dutch Drinking Water Sector
Critical Information Infrastructure Security, Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008. Revised Papers
, page 190.
2008
|
Empirical Findings on Critical Infrastructure Dependencies in Europe
Critical Information Infrastructure Security, Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008. Revised Papers
, page 302.
2008
|
European Risk Assessment Methodology for Critical Infrastructures
Proceedings IEEE Conference Building Networks for Brighter Futures, Rotterdam
Publisher: IEEE,
2008
|
Towards a common model for studying critical infrastructure interdependencies
Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, 2008 IEEE
, page 1-6.
Publisher: IEEE,
2008
Keywords: Benchmark testing;Communication system software;Guidelines;Information security;Power system dynamics;Power system modeling;Power system security;Power system simulation;Power system stability;Software tools;failure analysis;fault diagnosis;power system analysis computing;power system faults;power system security;telecommunication security;communication and information systems;critical infrastructure interdependencies;dynamic stability;electrical infrastructure;faulty router;long term stability;operating constraints;power system;telecommunication network;Benchmark;Blackouts;Combined Simulators;Critical Infrastructures;ICT;Interdependencies;Power Systems; |
Modeling Critical Infrastructure Dependencies
In P. Mauricio and S. Shenoi, editor,
Critical Infrastructure Protection II
Volume 290
of IFIP
, page 205-214.
Publisher: Springer, Boston, MA, USA
2008
|
I2Sim: A matrix-partition based framework for critical infrastructure interdependencies simulation
Electric Power Conference, 2008. EPEC 2008. IEEE Canada
, page 1-8.
Publisher: IEEE,
2008
Keywords: Humans;Large-scale systems;Mathematical model;Partitioning algorithms;Petroleum;Physical layer;Power system modeling;Power system simulation;Real time systems;Transportation;matrix algebra;power system simulation;real-time systems;I2Sim framework;Loentief input-output model;MATE model;cell-channel model;infrastructure interdependencies simulation;large-scale real-time power system simulation;matrix-partition based framework;multi-area Thevenin equivalent technique;Critical Infrastructures;Infrastructure Simulation;MATE model;Simulation Technique; |
Federated simulations for systems of systems integration
In Mason, Scott J. and Hill, Raymond R. and Mönch, Lars and Rose, Oliver and Jefferson, Thomas and Fowler, John W., editor,
Winter Simulation Conference
, page 1121-1129.
Publisher: WSC,
2008
ISBN: 978-1-4244-2708-6 Keywords: dblp |
I2Sim Modelling and Simulation Framework for Scenario Development, Training, and Real-Time Decision Support of Multiple Interdependent Critical Infrastructures during Large Emergencies
How is Modelling and Simulation Meeting the Defence Challenges out to 2015?
Volume RTO-MP-MSG-060
, page 16.1-16.14.
Publisher: NATO RTO Modelling and Simulation Group Conf., Vancouver, BC, Canada,
2008
ISBN: 978-92-837-0076 |
Council Directive 2008/114/EC of 8 December 2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection OJEU
European Commission,
2008
|
2007 |
A Federated Approach to Parallel and Distributed Simulation of Complex Systems
Int. J. Appl. Math. Comput. Sci.,
17(1):99-106
2007
ISSN: 1641-876X Keywords: Computer Networks Simulation, Distributed Simulation, Federated Simulators, Frame Relay, Parallel Simulation |
Connectivity models of interdependency in mixed-type critical infrastructure networks
Inf. Secur. Tech. Rep.,
12(1):44-55
2007
ISSN: 1363-4127 |
OpenMI: Open modelling interface
J. of Hydroinformatics,
9(3):175-191
2007
|
An Agent-based Service-Oriented Simulation Suite for Critical Infrastructure Behavior Analysis
Int. J. of Business Process Integration and Management,
2(4):312-326
2007
|
Toward Modeling and Simulation of Critical National Infrastructure Interdependencies
IIE Transactions,
39(1):57-71
2007
|
Cellular automata algorithm for simulation of surface flows in large plains
Simulation Modelling Practice and Theory,
15(3):315-327
2007
|
Modelling interdependencies between the electricity and information infrastructures
In F. Saglietti and N. Oster, editor,
SAFECOMP 2007 Volume 4680
of LNCS
page 54-67.
Publisher: Springer, Berlin Heidelberg
2007
|
Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007
In Eric Goetz and Sujeet Shenoi, editor,
Volume 253
of IFIP
Publisher: Springer,
2007
ISBN: 978-0-387-75461-1 |
Creating a European SCADA Security Testbed
Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007
, page 237-247.
2007
|
Towards a European Research Agenda for CIIP: Results from the CI2RCO Project
Critical Information Infrastructures Security, Second International Workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007. Revised Papers
, page 1-12.
2007
|
Information Operations and Critical Infrastructure Protection: The Challenges
In Accademia Nazionale Dei Lencei, editor,
Proceedings XVI Conferenza Amaldi sui problemi della sicurezza globale, ICTP
, page 107.
Publisher: Accademia Nazionale Dei Lencei,
2007
|
A Federated Simulation Environment for Hybrid Systems
Proc. 21st Int. Workshop on Principles of Advanced and Distributed Simulation
of PADS '07
, page 198-210.
Publisher: IEEE Computer Society, Washington, DC, USA
2007
DOI: 10.1109/PADS.2007.5 ISBN: 0-7695-2898-8 |
Towards a Standardised Cross-Sector Information Exchange on Present Risk Factors
Proc. 2nd Int. Workshop on Critical Information Infrastructures Security (CRITIS '07)
2007
|
Conceptualizing Critical Infrastructures as Service Oriented Complex Interdependent Systems
International Conference on Information Technology and Management (ICITM'07)
Publisher: ISM Press,
2007
ISBN: 988-97311-5-0 |
Federated Agent-based Modeling and Simulation Approach to Study Interdependencies in IT Critical Infrastructures
Distributed Simulation and Real-Time Applications, 2007. DS-RT 2007. 11th IEEE International Symposium
, page 182-189.
2007
Keywords: IT critical infrastructures;OMNeT++;agent-based modeling and simulation;expertise sharing;federated agent-based modeling;federated simulation;simulation models reuse;digital simulation;public utilities;software agents;software reusability; |
Final Report, System Disturbance on 4 November 2006
Union for the Co-ordination of Transmission of Electricity (UCTE),
2007
|
Availability and Robustness of Electronic Communications Infrastructures: The ARECI Study: Final report |
Bericht über die Systemstörung im deutschen und europäischen Verbundsystem am 4. November 2006 |
ETNO Common Position on the draft 'Directive on the identification and designation of European Critical Infrastructure' and the report on 'Availability and Robustness of Electronic Communications Infrastructures' |
2006 |
FR/ASimJava: a federated approach to parallel and distributed network simulation in practice
J. Telecommunications & Information Technology,
2006(4):53-59
2006
Keywords: Computer Networks Simulation, Distributed Simulation, Federated Simulators, Frame Relay, Parallel Simulation |
Sensitivity analysis practices: Strategies for model-based inference
Reliability Engineering & System Safety,
91(10):1109-1125
2006
|
Protection of the Dutch critical infrastructures
IJCIS,
2(2/3):201
2006
|
CIMS: A Framework for Infrastructure Interdependency Modeling and Analysis
Proceedings of the 2006 Winter Simulation Conference,
2006
|
Towards a Holistic Metamodel for Systems of Critical Infrastructures
European CIIP Newsletter,
2(3)
2006
|
EPOCHS: A Platform for Agent-Based Electric Power and Communication Simulation Built from Commercial Off-The-Shelf Components
IEEE Trans. on Power Systems,
21(2):548-559
2006
|
Critical Information Infrastructures Security, First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006, Revised Papers
In Javier López, editor,
Volume 4347
of Lecture Notes in Computer Science
Publisher: Springer,
2006
ISBN: 3-540-69083-2 |
An Overview of R&D Activities in Europe on Critical Information Infrastructure Protection (CIIP)
Critical Information Infrastructures Security, First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006, Revised Papers
, page 91-102.
2006
DOI: 10.1007/11962977_8 |
Group information foraging in emergency response: an illustration incorporating discrete-event simulation
Proceedings of the Winter Simulation Conference, 2006. WSC 06
, page 554-561.
Publisher: Winter Simulation Conference,
2006
|
CIMS: A Framework for Infrastructure Interdependency Modeling and Analysis
Simulation Conference, 2006. WSC 06. Proc. Winter
, page 478-485.
2006
Keywords: Computational modeling;Computer integrated manufacturing;Computer science;Hurricanes;Information security;Laboratories;National security;Protection;Public healthcare;US Department of Transportation;digital simulation;information systems;operations research;CIMS;infrastructure interdependency modeling;simulation tools; |
Designing what-if analysis: towards a methodology
Proceedings of the 9th ACM international workshop on Data warehousing and OLAP
, page 51-58.
ACM
2006
|
A Service Oriented Approach to Critical Infrastructure Modeling
Workshop on Service Oriented Techniques
Publisher: NRC-Canada,
2006
|
National Infrastructure Protection Plan
US Department of Homeland Security,
2006
|
Critical infrastructure interdependency modeling: A survey of U.S. and international research Document number: INL/EXT-06-11464
Idaho National Laboratory,
2006
|
Emergency Data Exchange Language (EDXL) Distribution Element Document number: 1
2006
|
IRRIIS: Integrated Risk Reduction of Information-based Infrastructure Systems |
The Imminent Storm 2006: Vulnerable Emergency Communications in Eight Hurricane Prone States |
Communication from the Commission on a European Programme for Critical Infrastructure Protection, COM(2006) 786 final |
2005 |
Using Web Services to Integrate Heterogeneous Simulations in a Grid Environment
Future Generation Computer Systems,
21(1):97-106
2005
|
Information sharing and decision support for C(I)IP
CIP Europe 2005
of GI-Edition - Lecture Notes in Informatics (LNI) - Proceedings
, page 7-12.
Publisher: Köllen, Bonn
2005
|
Critical Infrastructure Awareness Required by Civil Emergency Planning
Proc. 1st IEEE International Workshop on Critical Infrastructure Protection (IWCIP '05)
, page 110-118.
Publisher: IEEE Computer Society, Washington, DC, USA
2005
|
International Interdependency of C(I)IP in Europe (Internationale Verflechtung von C(I)IP in Europa)
Proc. CIP Europe 2005 - Critical Infrastructure Protection, GI CIS Forum, Bonn, Germany
2005
|
Integrating Software Architectures for Distributed Simulations and Simulation Analysis Communities Document number: SAND 2005-6642
Sandia National Laboratory,
2005
|
2004 |
Assured Counter-Terrorism Information Sharing Using Attribute Based Information Security (ABIS)
IEEEAC,
1235(8)
2004
|
A federated approach to distributed network simulation
ACM Trans. Modeling and Computer Simulation,
14(2):116-148
2004
ISSN: 1049-3301 Keywords: Simulation, distributed simulation, networks |
Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: The Hague, Netherlands, 10-13 October 2004
Publisher: IEEE,
2004
ISBN: 0-7803-8566-7 |
A Distributed Simulation Backbone for Executing HLA-based Simulation over the Internet
Workshop on Grid Computing & Applications, Proc. 2nd International Conference on Scientific and Engineering Computation
, page 96-103.
2004
|
Critical Infrastructure Integration Modeling and Simulation
In Chen, H. and Moore, R. and Zeng, E. and Leavitt, J., editor,
Proc. 2nd Symposium on Intelligence and Security Informatics (ISI-2004)
Volume 3073
of LNCS
, page 214-225.
Publisher: Springer-Verlag,
2004
|
IDSim: An Extensible Framework for Interoperable Distributed Simulation
IEEE International Conference on Web Services 2004 (ICWS'04)
, page 532-539.
Publisher: IEEE,
2004
|
The Use of Attack Trees in Assessing Vulnerabilities in SCADA Systems
International Infrastructure Survivability Workshop (IISW'04)
Publisher: IEEE,
2004
|
An Architecture for Web-Services Based Interest Management in Real Time Distributed Simulation
Distributed Simulation and Real-Time Applications, 2004. DS-RT 2004. Eighth IEEE International Symposium on
, page 108-115.
Publisher: IEEE,
2004
DOI: 10.1109/DS-RT.2004.6 Keywords: Access protocols;Command and control systems;Project management;Service oriented architecture;Simple object access protocol;TCPIP;Transport protocols;Web and internet services;Web services;XML; |
Modeling and Simulating Critical Infrastructures and Their Interdependencies
Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 2 - Volume 2
of HICSS '04
, page 20054.1-.
Publisher: IEEE Computer Society, Washington, DC, USA
2004
ISBN: 0-7695-2056-1 |
Final Report of the Investigation Committee on the 28 September 2003 Blackout in Italy
Union for the Co-ordination of Transmission of Electricity (UCTE),
2004
|
2003 |
The Vulnerable Internet, A study of the critical infrastructure of (the Dutch portion of) the Internet
:11
2003
ISBN: 1-4020-7601-0 |
Critical Infrastructure Protection in The Netherlands: A Quick-scan
In U. E. Gattiker, editor,
EICAR 2002 Conference Best Paper Proceedings
Publisher: EICAR, Copenhagen, Denmark
2003
ISBN: 87-987271-2-5 |
INFORMATIK 2003 - Mit Sicherheit Informatik, Schwerpunkt ``Sicherheit - Schutz und Zuverlässigkeit", 29. September - 2. Oktober 2003 in Frankfurt am Main
In Rüdiger Grimm and Hubert B. Keller and Kai Rannenberg, editor,
Volume 36
of LNI
Publisher: GI,
2003
ISBN: 3-88579-330-X |
Critical (information) Infrastructure Protection in The Netherlands
INFORMATIK 2003 - Mit Sicherheit Informatik, Schwerpunkt ``Sicherheit - Schutz und Zuverlässigkeit", 29. September - 2. Oktober 2003 in Frankfurt am Main
, page 9.
2003
|
Web enabling an RTI - an XMSF profile
Proc. 2003 SISO European Simulation Interoperability Workshop (EURO SIW '03)
Publisher: Simulation Councils, Inc., San Diego, CA, USA
2003
Note: Conference: June 16-19, 2008, Stockholm, Sweden |
2002 |
Supply chain infrastructures: system integration and information sharing
SIGMOD Rec.,
31(1):61-66
2002
ISSN: 0163-5808 |
Extensible Modeling and Simulation Framework (XMSF) Challenges for Web-Based Modeling & Simulation Findings and Recommendations Report: Technical Challenges Workshop, Strategic Opportunities Symposium
MOVES Institute, Monterey, CA, USA
2002
|
XML-Encryption Syntax and Processing. W3C Recommendation 10 December 2002
W3C,
2002
|
XML-Signature Syntax and Processing. W3C Recommendation 12 February 2002 |
2001 |
Identifying, Understanding, and Analyzing Critical Infrastructure Interdependencies
IEEE Control System Magazine,
December:11-25
2001
|
Parallel simulation: parallel and distributed simulation systems
Proceedings of the 33nd conference on Winter simulation
of WSC '01
, page 147-157.
Publisher: IEEE Computer Society, Washington, DC, USA
2001
ISBN: 0-7803-7309-X |
Building a Web-Based Federated Simulation System with Jini and XML
Proceedings of the 34th Annual Simulation Symposium (SS01)
of SS '01
, page 143-.
Publisher: IEEE Computer Society, Washington, DC, USA
2001
|
2000 |
Interest Management in Large-Scale Virtual Environments
Presence: Teleoper. Virtual Environ.,
9(1):52-68
2000
ISSN: 1054-7460 |
Design of high performance RTI software
Distributed Simulation and Real-Time Applications, 2000.(DS-RT 2000). Proceedings. Fourth IEEE International Workshop on
, page 89-96.
IEEE
2000
|
IEEE 1516-2000: High Level Architecture - Federate Interface Specification
The Institute of Electrical and Electronics Engineers, Inc.,
2000
|
IEEE 1516-2000: High Level Architecture - Framework and Rules
The Institute of Electrical and Electronics Engineers, Inc.,
2000
|
1999 |
Attack Trees
Dr Dobb's Journal,
24(12)
1999
|
Handlungsempfehlungen zur Information der Öffentlichkeit (nach 11a Störfall-Verordnung)
Publisher: Umweltbundesamt,
1999
|
On the HLA-based Coupling Of Simulation Tools
Proc. 13th European Simulation Multiconference (ESM '99)
Volume 1
, page 45-51.
Publisher: SCS - Society for Computer Simulation,
1999
Note: Conference: Warszaw, Poland, June 1-4, 1999 |
1998 |
High-Level Architecture Object Model Template Specification Version 1.3
U.S. DoD,
1998
|
1997 |
Sensitivity analysis and related analyses: a review of some statistical techniques
Journal of Statistical Computation and Simulation,
57(1-4):111-142
1997
|
Building and Sustaining Inter-Organizational Information Sharing Relationships: The Competitive Impact of Interfacing Supply Chain Operations with Marketing Strategy
ICIS '97 Proceedings of the eighteenth international conference on Information systems
, page 205-222.
Publisher: Stern School of Business, New York University,
1997
|
1996 |
Decision Support for Management
Publisher: Prentice-Hall, Inc., Upper Saddle River, NJ, USA
1996
ISBN: 0-13-396268-7 |
1993 |
Efficient algorithms for distributed snapshots and global virtual time approximation
Journal of Parallel and Distributed Computing,
18(4)
1993
|
Breathing Time Warp
Proceedings of the seventh workshop on Parallel and distributed simulation
of PADS '93
, page 109-118.
Publisher: ACM, New York, NY, USA
1993
ISBN: 1-56555-055-2 |
IEEE 1278-1993 - Standard for Distributed Interactive Simulation
The Institute of Electrical and Electronics Engineers, Inc.,
1993
|
1990 |
SRADS with local rollback
Publisher: Institute for Parallel Computation, School of Engineering and Applied Science, University of Virginia,
1990
|
MTW: Experimental Results for a Constrained Optimistic Scheduling Paradigm
In Nicol, David, editor,
Distributed Simulation Volume 22
of Simulation
page 169-173.
Publisher: Society for Computer Simulation (SCS), San Diego, CA
1990
|
1985 |
Virtual time
ACM Trans. Program. Lang. Syst.,
7(3):404-425
1985
ISSN: 0164-0925 DOI: 10.1145/3916.3988 |
1982 |
Building Effective Decision Support Systems
Publisher: Prentice Hall Professional Technical Reference,
1982
ISBN: 0130862150 |
1979 |
Distributed Simulation: A Case Study in Design and Verification of Distributed Programs
Software Engineering, IEEE Transactions on,
SE-5(5):440-452
1979
ISSN: 0098-5589 |
0 |
Economic impact assessment of Critical Infrastructure failure in the EU: A combined Systems Engineering--Inoperability Input-Output Model
0
|