Searched for: mods_originInfo_dateIssued_s:"2008"
(1 - 2 of 2)
document
Klaver, M.H.A. (author), Luiijf, H.A.M. (author), Nieuwenhuijs, A.H. (author), Cavenne, F. (author), Ulisse, A. (author), Bridegeman, G. (author), TNO Defensie en Veiligheid (author)
Most risk assessment methodologies aim at the risk at the level of an individual organization or company. The European Union commissioned a study to define the elements for a uniform and scalable risk assessment methodology which takes into account critical infrastructure dependencies across organizations and sectors. The method can be applied...
conference paper 2008
document
Christiansson, H. (author), Luiijf, H.A.M. (author), TNO Defensie en Veiligheid (author)
Supervisory control and data acquisition (SCADA) systems are commonly used to monitor and control critical infrastructure assets. However, over the past two decades, they have evolved from closed, proprietary systems to open networks comprising commodity platforms running common operating systems and TCP/IP stacks. The open architecture and...
bookPart 2008