Abstraction-based analysis of known and unknown vulnerabilities of critical information infrastructures (English)
- New search for: Rieke, Roland
- New search for: Rieke, Roland
In:
International journal of system of systems engineering
;
1
, 1
;
59-77
;
2008
-
ISSN:
- Article (Journal) / Print
-
Title:Abstraction-based analysis of known and unknown vulnerabilities of critical information infrastructures
-
Contributors:Rieke, Roland ( author )
-
Published in:International journal of system of systems engineering ; 1, 1 ; 59-77
-
Publisher:
- New search for: INDERSCIENCE ENTERPRISES LTD.,
-
Publication date:2008-01-01
-
Size:19 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 003.71
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 003.71 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 1, Issue 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
System of systems engineering: an emerging multidisciplineSousa-Poza, A. / Kovacic, S. / Keating, C. et al. | 2008
- 18
-
Littoral undersea warfare: a case study in process modelling for functionality and interoperability of complex systemsBindi, Victor 'Dirk' / Strunk, John / Baker, Jeffery / Bacon, Roger / Boensel, Matthew / III, Francis / Vaidyanathan, Ravi et al. | 2008
- 59
-
Abstraction-based analysis of known and unknown vulnerabilities of critical information infrastructuresRieke, Roland et al. | 2008
- 78
-
The CRUTIAL reference critical information infrastructure architecture: a blueprintVerissimo, P. / Neves, N.F. / Correia, M. et al. | 2008
- 96
-
Enforcing trust in pervasive computingLi, Shiqun / Balfe, Shane / Zhou, Jianying / Chen, Kefei et al. | 2008
- 111
-
Conceptualising social engineering attacks through system archetypesSarriegi, Jose M. / Gonzalez, Jose J. et al. | 2008
- 128
-
Trust establishment in sensor networks: behaviour-based, certificate-based and a combinational approachAivaloglou, Efthimia / Gritzalis, Stefanos / Skianis, Charalabos et al. | 2008
- 149
-
Early warning system for home users and small- and medium-sized enterprises: eight lessons learnedGattiker, U.E. et al. | 2008
- 171
-
A research agenda for systems of systems architectingValerdi, Ricardo / Axelband, Elliot / Baehren, Thomas / Boehm, Barry / Dorenbos, Dave / Jackson, Scott / Madni, Azad / Nadler, Gerald / Robitaille, Paul / Settles, Stan et al. | 2008
- 189
-
Mining intelligence data in the benefit of critical infrastructures security: vulnerability modelling, simulation and assessment, system of systems engineeringGheorghe, Adrian V. / Vamanu, Dan et al. | 2008
- 189
-
Mining intelligence data in the benefit of critical infrastructures security: vulnerability modeling, simulation and assessment, system of systems engineeringGheorghe, A.V. / Vamanu, D. et al. | 2008
- 222
-
Models for risk management of systems of systemsHaimes, Yacov Y. et al. | 2008
- 237
-
Risk management of an information infrastructure: a framework based upon security dependenciesBaiardi, F. / Telmon, C. et al. | 2008
- 257
-
R&D activities in Europe on critical information infrastructure protectionBologna, Sandro / Luiijf, Eric / Setola, Roberto et al. | 2008
- 271
-
Network-centric military system architecture assessment methodologyBalci, Osman / Ormsby, William F. et al. | 2008