منابع مشابه
Defending Critical Infrastructure
We apply new bilevel and trilevel optimization models to make critical infrastructure more resilient against terrorist attacks. Each model features an intelligent attacker (terrorists) and a defender (us), information transparency, and sequential actions by attacker and defender. We illustrate with examples of the US Strategic Petroleum Reserve, the US Border Patrol at Yuma, Arizona, and an ele...
متن کاملCritical infrastructure protection
The protection of Critical Infrastructures (CIs) has become one of the most cutting-edge research areas in recent years. There has been considerable effort and expenditure since 9/11 on the protection of ‘Critical National Infrastructure’ against different attacks. This is because information is out of control of the owner. The traditional device – centric security systems are not efficient eno...
متن کاملCritical Infrastructure Attack Modeling
The development and connection of information and communication technologies with industrial control systems in the so-called critical infrastructure have contributed to the emergence of new complex threats. The critical infrastructure has become a target of sophisticated cyber attacks which exploit several, also unknown, vulnerabilities in one course of an attack. The paper proposes an attack ...
متن کاملImproving Critical Infrastructure Cybersecurity
VeriSign, Inc. operates several of the world’s largest and most important DNS Registries (.com, .net, .gov, and more). Because of this operational role that we fulfill, we continually strive to foster and ensure the security and stability of the global Internet [10]. In this vein, we applaud the National Institute of Standards and Technology’s (NIST’s) request for information: NIST Docket Numbe...
متن کاملChallenges in Critical Infrastructure Security
The threat landscape is continuously evolving. Large, widespread worm infections are leaving more and more space to more stealthy attacks targeting highly valuable targets. Industrial Control Systems (ICS) are rapidly becoming a new major target of cyber-criminals: ICS are evolving, bringing powerful capabilities into the critical infrastructure environment along with new and yet undiscovered t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: A Peer-Reviewed Journal About
سال: 2014
ISSN: 2245-7755
DOI: 10.7146/aprja.v3i1.116097