منابع مشابه
Philosophy of Protection for Critical Infrastructure Systems
The Universal Command and Control System (UCCS) is a highly distributed system involving numerous platforms and commands, supporting military operations worldwide. The Highly Reliable Software Production Facility (HRSPF), recently assigned responsibility for improving system performance, has generated routing algorithm update 3.01 to be installed in thousands of routers throughout the system, i...
متن کاملError Recovery in Critical Infrastructure Systems
Critical infrastructure applications provide services upon which society depends heavily; such applications require survivability in the face of faults that might cause a loss of service. These applications are themselves dependent on distributed information systems for all aspects of their operation and so survivability of the information systems is an important issue. Fault tolerance is a key...
متن کاملCritical Infrastructure Systems Modelling: Benchmarking CPNTools
This paper reports on the application of systems modelling benchmarks to determine the viability of systems modelling software and its suitability for modelling critical infrastructure systems. This research applies the earlier research that related to developing benchmarks that when applied to systems modelling software will indicate its likely suitability to modelling critical infrastructure ...
متن کاملAppraising Critical Infrastructure Systems with Visualisation
This paper explores the use of system modelling as an approach for appraising critical infrastructure systems. It reports on focus group findings with relation to the system modelling aspects of a critical infrastructure security analysis and modelling framework. Specifically, this discussion focuses on the interpretations of a focus group in terms of the likely benefits or otherwise of system ...
متن کاملOn Hardening Problems in Critical Infrastructure Systems
The power and communication networks are highly interdependent and form a part of the critical infrastructure of a country. Similarly, dependencies exist within the networks itself. It is essential to have a model which captures these dependencies precisely. Previous research has proposed certain models but these models have certain limitations. The limitations of the aforementioned models have...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Cyber Warfare and Terrorism
سال: 2011
ISSN: 1947-3435,1947-3443
DOI: 10.4018/ijcwt.2011070103