Searched for:
(1 - 20 of 43)

Pages

document
Luiijf, H.A.M. (author), Klaver, M.H.A. (author)
This chapter discusses new societal risk due to the fast information and communication as well as operational technology changes which are not yet fully taken into account by governmental policymakers and egulators. Internet-of-things, cloud computing, mass consumer markets and embedded operational technologies are some of the areas outlined in...
conference paper 2019
document
Burghouwt, P. (author), Maris, M. (author), van Peski, S. (author), Luiijf, H.A.M. (author), van de Voorde, I. (author), Spruit, M. (author)
conference paper 2017
document
Setola, R. (author), Luiijf, H.A.M. (author), Theocharidou, M. (author)
This chapter introduces the concept of Critical Infrastructure (CI). Although old civilisations had CI, the protection and resilience of CI has come to the fore again in the last two decades. The risk to society due to inadvertent and deliberate CI disruptions has largely increased due to interrelation, complexity, and dependencies of these...
conference paper 2016
document
Rossebo, J.E.Y. (author), Fransen, F. (author), Luiijf, H.A.M. (author)
The SEGRID (Security for Smart Electricity GRIDs) collaboration project, funded by the EU under the FP7 program investigates risk assessment methodologies and their possible need for enhancement. In this paper we discuss the need to include threat actor analysis in threat, vulnerability and risk assessments for smart grids based on the first...
conference paper 2016
document
Luiijf, H.A.M. (author)
conference paper 2014
document
Luiijf, H.A.M. (author), van Besseling, K. (author), Spoelstra, M. (author), de Graaf, P. (author)
A number of nations developed and published a national cyber security strategy (NCSS). Most of them were published in the period 2009 - 2011. Despite the fact that each of these NCSS intends to address the cyber security threat, large differences exist between the NCSS approaches. This paper analyses and compares the NCSS of Australia, Canada,...
conference paper 2013
document
Luiijf, H.A.M. (author)
This paper discusses critical infrastructures (CI) and their dependencies, with as central theme the hypothesis that a lack of CI situational awareness and protection in emergency management operations results in unnecessary amplification of the consequences. This paper discusses the hypothesis and findings along some well-known international...
conference paper 2013
document
Bijlsma, T. (author), de Kievit, S. (author), van de Sluis, H.J.D. (author), van Nunen, E. (author), Passchier, I. (author), Luiijf, H.A.M. (author)
Software is becoming an important part of the innovation for vehicles. In addition, the systems in vehicles become interconnected and also get external connections, to the internet and Vehicular Ad hoc NETworks (VANETs). These trends form a combined security and safety threat, because recent research has demonstrated a large number of security...
conference paper 2013
document
Nieuwenhuijs, A.H. (author), Luiijf, H.A.M. (author), Klaver, M.H.A. (author), TNO Defensie en Veiligheid (author)
This paper describes a model for expressing critical infrastructure dependencies. The model addresses the limitations of existing approaches with respect to clarity of definition, support for quality and the influence of operating states of critical infrastructures and environmental factors.
conference paper 2009
document
Luiijf, H.A.M. (author), TNO Defensie en Veiligheid (author)
conference paper 2009
document
TNO Defensie en Veiligheid (author), Rome, E. (author), Bologna, S. (author), Gelenbe, E. (author), Luiijf, H.A.M. (author), Masucci, V. (author)
Critical Infrastructures (CI) that are vital for a society and an economy, such as telecommunication systems, energy supply systems, transport systems and others, are getting more and more complex. Dependencies emerge in various ways, due to the use of information and communication technologies, legislation, market liberalisation, and other...
conference paper 2009
document
TNO Defensie en Veiligheid (author), Luiijf, H.A.M. (author), Klaver, M.H.A. (author)
This paper discusses critical infrastructures (CI) and their dependencies, with as central theme the hypothesis that a lack of CI situational awareness and protection in emergency management operations results in unnecessary amplification of the consequences. This paper discusses the hypothesis and findings along some well-known international...
conference paper 2009
document
Luiijf, H.A.M. (author), Nieuwenhuijs, A.H. (author), Klaver, M.H.A. (author), TNO Defensie en Veiligheid (author)
Most of our critical infrastructures consist of complex systems-of-systems that provide services or products. The coupling mechanism between the chained systems in such complex systems of systems is dependencies. Dependencies may propagate cascading failures. Most studies on dependencies in infrastructures are based on either an economic model...
conference paper 2008
document
Luiijf, H.A.M. (author), Klaver, M.H.A. (author), Delsasso, R. (author), Zomerhuis, A. (author), TNO Defensie en Veiligheid (author)
conference paper 2008
document
Klaver, M.H.A. (author), Luiijf, H.A.M. (author), Nieuwenhuijs, A.H. (author), Cavenne, F. (author), Ulisse, A. (author), Bridegeman, G. (author), TNO Defensie en Veiligheid (author)
Most risk assessment methodologies aim at the risk at the level of an individual organization or company. The European Union commissioned a study to define the elements for a uniform and scalable risk assessment methodology which takes into account critical infrastructure dependencies across organizations and sectors. The method can be applied...
conference paper 2008
document
Bendisch, U. (author), Bologna, S. (author), Le Grand, G. (author), Luiijf, H.A.M. (author)
This paper discusses the European Research Agenda for Critical In formation Infrastructure Protection (CIIP) which has been developed by the EU IST CI <sup>2</sup>RCO project. The Agenda identifies research challenges and analyses existing R&D gaps in CIIP. It integrates the insights and ideas of a broad cross-section of Critical Infrastructure...
conference paper 2008
document
Luiijf, H.A.M. (author), TNO Defensie en Veiligheid (author)
conference paper 2007
document
Klaver, M.H.A. (author), Luiijf, H.A.M. (author), Uneri, M. (author), TNO Defensie en Veiligheid (author)
A Federation of Systems type system (FoS) is made of individual, independent systems, which are owned by different nations and organizations. To implement a FoS, a number of challenges are to be faced such as interoperability and security of FoS. NEC concept can only be achieved by a Federation of Systems type design approach.
conference paper 2007
document
Luiijf, H.A.M. (author), TNO Defensie en Veiligheid (author)
conference paper 2007
document
Stolk, D.J. (author), Luiijf, H.A.M. (author), van Dijk, R. (author), TNO Defensie en Veiligheid (author)
conference paper 2007
Searched for:
(1 - 20 of 43)

Pages