This paper focuses on data collection within a procedural framework of vulnerability analysis for information security of Critical Infrastructures (CIs). The incidents occurred in CIs, which are owned and operated mostly by private companies, considering business continuity and reputation, are seldom open to public. Therefore, data collection becomes one of the key challenges in the case of scientific analyses. In addition, a close cooperation with the private companies is necessary in order to make a thorough investigation and fruitful analysis and create a win-win situation. Practical applications are presented, where holding workshops and organizing face-to-face interviews are mainly used for collecting primary information. Results of a ...
This paper outlines a security assessment methodology for analysing critical infrastructure networks...
This paper outlines a security assessment methodology for analysing critical infrastructure networks...
Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as su...
Critical Infrastructures (CIs) are complex systems. For their operations, these infrastructures are ...
The objective of this paper is to provide a systematic view on the problem of vulnerability and risk...
The objective of this paper is to provide a systematic view on the problem of vulnerability and risk...
The objective of this paper is to provide a systematic view on the problem of vulnerability and risk...
The objective of this paper is to provide a systematic view on the problem of vulnerability and risk...
Vulnerability and risk analysis are considered in relation to critical infrastructures protection. T...
Vulnerability and risk analysis are considered in relation to critical infrastructures protection. T...
Vulnerability and risk analysis are considered in relation to critical infrastructures protection. T...
Vulnerability and risk analysis are considered in relation to critical infrastructures protection. T...
The rapid advances in information and communication technology enable a shift from diverse systems e...
The rapid advances in information and communication technology enable a shift from diverse systems e...
Vulnerability assessment is a crucial aspect for the development of methodologies to define the leve...
This paper outlines a security assessment methodology for analysing critical infrastructure networks...
This paper outlines a security assessment methodology for analysing critical infrastructure networks...
Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as su...
Critical Infrastructures (CIs) are complex systems. For their operations, these infrastructures are ...
The objective of this paper is to provide a systematic view on the problem of vulnerability and risk...
The objective of this paper is to provide a systematic view on the problem of vulnerability and risk...
The objective of this paper is to provide a systematic view on the problem of vulnerability and risk...
The objective of this paper is to provide a systematic view on the problem of vulnerability and risk...
Vulnerability and risk analysis are considered in relation to critical infrastructures protection. T...
Vulnerability and risk analysis are considered in relation to critical infrastructures protection. T...
Vulnerability and risk analysis are considered in relation to critical infrastructures protection. T...
Vulnerability and risk analysis are considered in relation to critical infrastructures protection. T...
The rapid advances in information and communication technology enable a shift from diverse systems e...
The rapid advances in information and communication technology enable a shift from diverse systems e...
Vulnerability assessment is a crucial aspect for the development of methodologies to define the leve...
This paper outlines a security assessment methodology for analysing critical infrastructure networks...
This paper outlines a security assessment methodology for analysing critical infrastructure networks...
Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as su...