Searched for: subject%3A%22Critical%255C%2BInfrastructure%255C%2Bprotection%22
(1 - 20 of 25)
Pages
- 1
- 2
- document
-
Luiijf, H.A.M. (author), Klaver, M.H.A. (author)This chapter discusses new societal risk due to the fast information and communication as well as operational technology changes which are not yet fully taken into account by governmental policymakers and egulators. Internet-of-things, cloud computing, mass consumer markets and embedded operational technologies are some of the areas outlined in...conference paper 2019
- document
-
Luiijf, E. (author), Klaver, M. (author)This chapter discusses new societal risk due to the fast information and communication as well as operational technology changes which are not yet fully taken into account by governmental policymakers and regulators. Internet-of-things, cloud computing, mass consumer markets and embedded operational technologies are some of the areas outlined in...bookPart 2019
- document
-
Bouma, H. (author), Schutte, K. (author), ten Hove, R.J.M. (author), Burghouts, G.J. (author), Baan, J. (author)Surveillance systems are essential for the protection of military compounds and critical infrastructures. Automatic recognition of suspicious activities can augment human operators to find relevant threats. Common solutions for behavior analysis or action recognition require large amounts of training data. However, suspicious activities and...conference paper 2018
- document
- Burghouwt, P. (author), Maris, M. (author), van Peski, S. (author), Luiijf, H.A.M. (author), van de Voorde, I. (author), Spruit, M. (author) conference paper 2017
- document
-
Luiijf, H.A.M. (author), Theocharidou, M. (author), Rome, E. (author)CIPedia© http://www.cipedia.eu is a Wiki-based body of common knowledge for the wide international community of critical infrastructure (CI) protection and resilience stakeholders such as policy makers, researchers, governmental agencies, emergency management organizations, CI operators, and even the public.article 2015
- document
-
Nederlandse Organisatie voor Toegepast-Natuurwetenschappelijk Onderzoek (author), , Luiijf, H.A.M. , Maas, N. , Dijkema, G. , Zielstra, A. Vogel, R.A.L. (author)Het wereldwijde klimaat en ook het klimaat in Nederland verandert. De Nationale Adaptatiestrategie (NAS) vraagt om een breder inzicht in de risicofactoren voor Nederland als gevolg van de voorziene klimaatverandering. Onze energie-, transport-, informatie- en communicatietechnologie (ICT) - en overige (vitale) infrastructuren zijn mogelijk...report 2014
- document
-
Luiijf, H.A.M. (author), Hämmerli, B.M. (author)When discussing Smart Cities, Smart Grid, Smart Mobility and Smart everything, we have to reflect what this means in terms of investment and return. Which options for surveillance and Big Data applications are created? What is really desirable?article 2014
- document
-
Luiijf, H.A.M. (author)CRITIS 2013 took place in Amsterdam, The Netherlands, September 16-18, 2013. Key topic: Resilience of Smart Citiesarticle 2014
- document
-
van Eeten, M. (author), Nieuwenhuijs, A.H. (author), Luiijf, H.A.M. (author), Klaver, M.H.A. (author), Cruz, E. (author)The threat of cascading failures across critical infrastructures has been identified as a key challenge for governments. Cascading failure is seen as potentially catastrophic, extremely difficult to predict and increasingly likely to happen. Infrastructures are largely privately operated and private actors are thought to under-invest in...article 2011
- document
- te Paske, B.J. (author), Meulenhoff, P.J. (author), van Paassen, R.J.G. (author), Smets, R.C.J. (author), van der Waaij, B.D. (author) report 2011
- document
-
Luiijf, H.A.M. (author), Nieuwenhuijs, A.H. (author), Klaver, M.H.A. (author), van Eeten, M.J.G. (author), Cruz, E. (author)One type of threat consistently identified as a key challenge for critical infrastructure protection (CIP) is that of dependencies and interdependencies among different critical infrastructures (CI). This article draws on a hitherto untapped data source on infrastructure dependencies: a daily maintained database containing over 4500 serious...article 2010
- document
-
Luiijf, H.A.M. (author), Stolk, D.J. (author), TNO Defensie en Veiligheid (author)In 2007, a TableTop eXercise (TTX) on Critical Infrastructure Protection (CIP) was held in Sofia, Bulgaria. It was organised by the Civil Protection Committee (CPC) of the Euro-Atlantic Partnership Council (EAPC). The aim of the TTX was to identify gaps in existing policies and capabilities for the protection of the civil population and Critical...article 2010
- document
- Luiijf, H.A.M. (author), TNO Defensie en Veiligheid (author) public lecture 2010
- document
-
TNO Defensie en Veiligheid (author), Averill, B. (author), Luiijf, H.A.M. (author)Recent news of a “highly sophisticated and targeted” cyber attack on Google, Yahoo, and perhaps on as many as a dozen other companies has once again brought the issue of cyber security to the top of the news. Internet companies, however, are not the only ones vulnerable to such attacks. Over the past decade, a series of events has highlighted...article 2010
- document
-
TNO Defensie en Veiligheid (author), Luiijf, H.A.M. (author), Rome, E. (author)Ons doel is het ontstaan van een European Infrastructures Simulation and Analysis Centre (EISAC): een gedistribueerde Europese simulatiefaciliteit voor het analyseren van vitale infrastructuren, hun onderlinge afankelijkheden en hun gedrag bij calamiteiten. Het EU project DIESIS analyseerde de organisatorische, operationele en technische eisen...article 2010
- document
-
Luiijf, H.A.M. (author), Ali, M. (author), Zielstra, A. (author), TNO Defensie en Veiligheid (author)International studies have shown that information security for process control systems, in particular SCADA, is weak. As many critical infrastructure (CI) services depend on process control systems, any vulnerability in the protection of process control systems in CI may result in serious consequences for citizens and society. In order to...bookPart 2009
- document
-
Bonsen, I.M. (author), Gaasbeek, R.C. (author), TNO Defensie en Veiligheid (author)Current approaches in critical infrastructure protection use long lists of items that fail to give its user a structured answer to the state of protection of its object. The functionality approach uses different terrorist functions to structure the threat (which are to have intent, to scout, to transport, to attack and to have an effect). It...conference paper 2009
- document
-
TNO Defensie en Veiligheid (author), Luiijf, H.A.M. (author)The European Commission has started the Coordination Action Parsifal as well as another Specific Targeted Research Project for the critical financial infrastructure (CFI).article 2009
- document
-
TNO Defensie en Veiligheid (author), Luiijf, H.A.M. (author), Nieuwenhuijs, A.H. (author), Klaver, M.H.A. (author), van Eeten, M. (author), Cruz, E. (author)One type of threat consistently identified as a key challenge for Critical Infrastructure Protection (CIP) is that of cascading effects caused by dependencies and interdependencies across different critical infrastructures (CI) and their services. This paper draws on a hitherto untapped data source on infrastructure dependencies: a daily...bookPart 2009
- document
-
TNO Defensie en Veiligheid (author), Rome, E. (author), Bologna, S. (author), Gelenbe, E. (author), Luiijf, H.A.M. (author), Masucci, V. (author)Critical Infrastructures (CI) that are vital for a society and an economy, such as telecommunication systems, energy supply systems, transport systems and others, are getting more and more complex. Dependencies emerge in various ways, due to the use of information and communication technologies, legislation, market liberalisation, and other...conference paper 2009
Searched for: subject%3A%22Critical%255C%2BInfrastructure%255C%2Bprotection%22
(1 - 20 of 25)
Pages
- 1
- 2