2012 International Conference on Cyber Security 2012
DOI: 10.1109/cybersecurity.2012.25
|View full text |Cite
|
Sign up to set email alerts
|

A Generic Approach to Critical Infrastructure Modeling and Simulation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
4
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…Work described in [9] presents high abstraction level method of modelling Critical Infrastructure, as transformation from a detailed "Potential" system model to a "Specific" model reflecting a particular instance of the system. The resulting system model consists of functional components transforming input factors into products.…”
Section: Related Workmentioning
confidence: 99%
“…Work described in [9] presents high abstraction level method of modelling Critical Infrastructure, as transformation from a detailed "Potential" system model to a "Specific" model reflecting a particular instance of the system. The resulting system model consists of functional components transforming input factors into products.…”
Section: Related Workmentioning
confidence: 99%
“…Research work described in [11] presents a high abstraction level method of modeling CI, as transformation from a detailed "potential" system model to a "specific" model reflecting a particular instance of the system. Authors of [12] describe the Critical Infrastructure Protection and Resilience simulation (CIPRsim) modeling and simulation framework, which has the capability for simulation and visualization of effects and interdependencies associated with a hazard or threat event.…”
Section: Related Workmentioning
confidence: 99%
“…Abnormal situations such as critical or emergency situations in the energy sector are the subject of energy security studies [3]. Semantic Modeling [4], which involve Cognitive Maps, Bayesian networks, Markov processes, Petri Nets and Ontology-based Modeling [5], is applied in research of energy security.…”
Section: Introductionmentioning
confidence: 99%