Searched for: mods_originInfo_dateIssued_s:"2008"
(1 - 3 of 3)
document
Luiijf, H.A.M. (author), TNO Defensie en Veiligheid (author)
Organisaties die het Internet Protocol(IP) gebruiken voor beveiligingsdoeleinden en aanbieders van beveiligingsproducten ontkomen de komende jaren niet aan de overgang naar het nieuwe protocol lPv6. Enerzijds is het gelukkig dat die overgang niet op één dag wereldwijd zal plaatsvinden, er is geen 'IP-wereldconversiedag' anderzijds betekent het...
article 2008
document
Luiijf, H.A.M. (author), Nieuwenhuijs, A.H. (author), Klaver, M.H.A. (author), TNO Defensie en Veiligheid (author)
Most of our critical infrastructures consist of complex systems-of-systems that provide services or products. The coupling mechanism between the chained systems in such complex systems of systems is dependencies. Dependencies may propagate cascading failures. Most studies on dependencies in infrastructures are based on either an economic model...
conference paper 2008
document
Bologna, S. (author), Luiijf, H.A.M. (author), Setola, R. (author), TNO Defensie en Veiligheid (author)
In the last few years, there has been an increasing worry about Critical Information Infrastructures, their reliability, security and protection. Due to the huge complexity and novelty of the topic and the new challenge that it poses, world-wide large investment in R&D are planned for the future. Our study has shown that Critical Information...
article 2008