Content
2006, Volume 2, Issue 4
- 347-356 Another tool in the business of spatial framing of illicit/lost from account radioactive material: helping the AT (Anti-Terrorism) paraphernalia thrive
by Adrian V. Gheorghe & Dan V. Vamanu - 357-378 The governance of cybersecurity: a framework for policy
by Michel J.G. Van Eeten & Hans De Bruijn & Mirjam Kars & Haiko Van Der Voort & Jaap Van Till - 379-395 A strategic approach to risk governance of critical infrastructures
by Maurizio Sajeva & Marcelo Masera - 396-411 Test data for anomaly detection in the electricity infrastructure
by John Bigham & David Gamez & Xuan Jin & Chris Phillips - 412-433 DHT-based security infrastructure for trusted internet and grid computing
by Kai Hwang & Min Cai & Yu-Kwong Kwok & Shanshan Song & Yu Chen & Ying Chen
2006, Volume 2, Issue 2/3
- 113-120 Towards next generation infrastructures: an introduction to the contributions in this issue
by P.M. Herder & Z. Verwater-Lukszo - 121-132 Innovation in networked infrastructures: coping with complexity
by Margot P.C. Weijnen & Ivo Bouwmans - 133-145 Modelling infrastructures as socio-technical systems
by Maarten Ottens & Maarten Franssen & Peter Kroes & Ibo Van De Poel - 146-159 Research agenda for an integrated approach to infrastructure planning, design and management
by R. John Hansman & Christopher Magee & Richard De Neufville & Renee Robins & Daniel Roos - 160-170 New dilemmas in regulating critical infrastructures
by E.F. Ten Heuvelhof - 171-186 Asset maintenance management: state of the art in the European railways
by Arjen Zoeteman - 187-200 Innovative contracting in infrastructure design and maintenance
by S. Van Herk & P.M. Herder & W.M. De Jong & D.S.M. Alma - 201-214 Protection of the Dutch critical infrastructures
by Eric A.M. Luiijf & Marieke H.A. Klaver - 215-230 The next step: quantifying infrastructure interdependencies to improve security
by Rae Zimmerman & Carlos E. Restrepo - 231-246 Assuring high reliability of service provision in critical infrastructures
by Mark De Bruijne & Michel Van Eeten & Emery Roe & Paul Schulman - 247-260 Emergent information security in critical infrastructures
by Semir Daskapan & Willem G. Vree & Rene W. Wagenaar - 261-272 Distributed intelligence in autonomous multi-vehicle systems
by Koen H. Van Dam & Zofia Verwater-Lukszo & Jaap A. Ottjes & Gabriel Lodewijks - 273-293 Critical infrastructures at risk: securing electric power supply
by Wolfgang Kroger - 294-317 Privatisation of seaport infrastructures: a framework for understanding the transfer of property rights
by Nathan Bowden & Martin De Jong
2006, Volume 2, Issue 1
- 1-9 Seaport infrastructure investment and economic growth in Korea
by Seung-Hoon Yoo - 10-49 Network security mechanisms utilising network address translation
by John T. Michalski - 50-69 Nodal prices in an integrated energy system
by Ana M. Quelhas & Esteban Gil & James D. McCalley - 70-82 Risks in business design for critical infrastructures: the 'DASHBOARD' concept
by Adrian V. Gheorghe & Dan V. Vamanu - 83-95 Polyphase FIR filters and Fant's re-sampling algorithm for securing information in critical information infrastructures: a new approach
by Dan E.C. Gheorghe - 96-112 Conference Report. Forum on Homeland Security, the USA, Europe, and the rest of the world: new challenges for institutions and the private sector
by Richard Narich
2005, Volume 1, Issue 4
- 299-311 Operator support for ageing nuclear critical infrastructure systems: integrating ecological interface design with prospect theory
by Catherine Burns & Ali Asgary & Jason K. Levy - 312-329 Reading vulnerability in phase portraits: an exercise in probabilistic resilience assessment
by Adrian V. Gheorghe & Dan V. Vamanu - 330-345 A future for nuclear energy: pebble bed reactors
by Andrew C. Kadak - 346-356 Strategic aspects of aging nuclear infrastructure: game theory and the Chernobyl event
by D. Marc Kilgour & Jason K. Levy - 357-366 Decision support for the management of aging nuclear critical infrastructures: vulnerability assessment and multi-criteria decision analysis
by Jason K. Levy - 367-379 Natural disasters and nuclear critical infrastructure negotiations: conflict resolution in Turkey
by Kevin W. Li & Jason K. Levy & Ning Li & Jens Hartmann - 380-393 Potential for British research into the transmutation of radioactive wastes and problematic nuclear materials
by W.J. Nuttall & D.G. Ireland & J.S. Al-Khalili & W. Gelletly - 394-403 Improving the ecological footprint of nuclear energy: a risk-based lifecycle assessment approach for critical infrastructure systems
by Gernot Stoeglehner & Jason K. Levy & Georg Christian Neugebauer - 404-422 Identifying potential repositories for radioactive waste: multiple criteria decision analysis and critical infrastructure systems
by Kouichi Taji & Jason K. Levy & Jens Hartmann & Michelle L. Bell & Richard M. Anderson & Benjamin F. Hobbs & Tom Feglar
2005, Volume 1, Issue 2/3
- 125-143 Framing a new approach to critical infrastructure modelling and extreme events
by David M. Simpson & Thomas D. Rockaway & Terry A. Weigel & Paul A. Coomes & Carol O. Holloman - 144-154 Assessing the performance of interdependent infrastructures and optimising investments
by Linda K. Nozick & Mark A. Turnquist & Dean A. Jones & Jennifer R. Davis & Craig R. Lawton - 155-169 Using PRTR database for the assessment of surface water risk and improvement of monitoring in Japan
by Jens Hartmann & Norio Okada & Jason Levy - 170-194 Transportation data visualisation and mining for emergency management
by Chang-Tien Lu & Lakshmi N. Sripada & Shashi Shekhar & Rulin Liu - 195-215 Risk management of complex critical systems
by Andrew Koubatis & Jorge Yerena Schonberger - 216-246 On the vulnerability of critical infrastructures: "seeing it coming"
by Adrian V. Gheorghe & Dan V. Vamanu - 247-257 Risk analysis of information systems by event process chains
by Ralf Mock & Maurizio Corvo - 258-268 The socio-political dimensions of critical information infrastructure protection (CIIP)
by Myriam Dunn - 269-280 An educational experiment to address infrastructure needs
by Ross B. Corotis & Dan M. Frangopol & James Diekmann & Keith Molenaar & George Hearn - 281-286 Some insights on issues related to specifics of the use of probability, risk, uncertainty and logic in PRA studies
by Dan Serbanescu - 287-292 Some lessons learnt from the use of PRA during the design phase
by Henriette Van Graan & Dan Serbanescu & Louis Eloff & Yolanda Combrink
2004, Volume 1, Issue 1
- 8-19 Critical infrastructures will remain vulnerable: neighbourhoods must fend for themselves
by Edward E. Balkovich & Robert H. Anderson - 20-37 Prioritising access to scarce resources: network survivability through policy supported quality of service
by Luiz A. DaSilva & Kaustubh Phanse - 38-63 Risk assessment of catastrophic failures in electric power systems
by L. Mili & Q. Qiu & A.G. Phadke - 64-75 Hidden failures in electric power systems
by Arun G. Phadke - 76-84 Complexity induced vulnerability
by Adrian V. Gheorghe & Dan V. Vamanu - 86-99 A method for the study of cascading effects within lifeline networks
by Benoit Robert - 100-107 Documenting damage, disruption, interdependencies and the emergency response of power and communication systems after earthquakes
by Anshel J. Schiff - 108-117 Assessing infrastructure interdependencies: the challenge of risk analysis for complex adaptive systems
by Theresa Brown & Walt Beyeler & Dianne Barton - 118-124 Risks, vulnerability, sustainability and governance: a new landscape for critical infrastructures
by Adrian V. Gheorghe