THEORETICAL FOUNDATIONS OF SECURITY

Methods and approaches for the preparation of a comparative analysis of critical infrastructures. Analysis evaluation criteria. Criteria for evaluating the analysis

  • 1 Institute of Metal Science Equipment and Technologies with Hydroaerodynamics Center "Acad. A Balevski”, Sofia, Bulgaria
  • 2 Kozloduy Nuclear Power Plant

Abstract

There are numerous methodological approaches for modelling, numerical analysis and/or simulation of the behaviour of individual systems. However, modelling the interdependencies between task-oriented or dedicated systems (the so-called system of systems) and describing their complex behaviour, necessarily through simulation, is still an unsolved issue.

Keywords

References

  1. Critical Foundations: Protecting America‟s Infrastructures, Paper of the President‟s Commission on Critical Infrastructure Protection, Washing-ton D.C., 1997;
  2. Panevski V. „INTEGRATED CRITICAL INFRASTRUCTURE SECURITY MANAGEMENT“ International Scientific Journal Security & Future, 1/2018, Scientific Technical Union of Mechanical Engineering Industry 4.0, 2018, ISSN:2535-0668, р.р. 3-6;;
  3. Haimes, Y. Y. „Risk Modeling, Assessment, and Management”, 2nd Ed. Wiley, NY. ISBN:0471480487, (2004);
  4. Department of Homeland Security. “National Infrastructure Protection Plan”, DHS, (2006);
  5. Panevski V.. „Competence centres and intelligent security systems in Bulgaria“, International Scientific Journal “Security & Future”, YEAR III, ISSUE 1, НТС по машиностроене, 2019, ISBN:WEB ISSN 2535-082X, р.р 14-16;
  6. S. Rinaldi, “Modeling and Simulating Critical Infrastructures and Their Interdependencies”, Proceedings of the 37th Hawaii International Cconference on System Science. Hawaii, (2004).5. Juni 2008 50/50. D. Reinermann and J. Weber. “Analysis of Critical Infrastructues: The ACIS Methodology (Analysis of Critical Infrastructural Sectors)”, Critical Infrastructure Protection Workshop. Frankfurt, (2003);
  7. S. Panzieri, R. Setola, and G. Ulivi. “An approach to model complex in-terdependent infrastructures”, Universita "Roma Tre", Roma., (2005);
  8. S. Lee “A frame work for supporting bottom up ontology evolution for discovery and description of Grid services”. Expert systems with Applications, 32(2):pp.376-385, (2007);
  9. V. Temnenco. “Software Estimation”, Enterprise-Wide. (2007);
  10. S. Rinaldi, J. Peerenboom and S. Kelly “Critical Infrastructure Interdependencies”, IEE Control Systems Magazine, (2001);
  11. R.J. Ellison, N.R. Mead, T. A. Longstaff and R. C. Linger. ,, The Survivability Imperative: Protecting Critical Systems”, The Journal of Defense Software Engineering, (2000);
  12. I. Dobson, B. Carreras, V. Lynch and D.E. Newman. ,, Complex systems analysis of series of blackouts: cascading failure, criticality, and self-organization”, Bulk Power System and Control, Cortina d' Ampezzo, It-aly, (2004);
  13. F.M. Marshall, D. M. Rasmuson and A. Mosleh. “Common Cause Failure Data Collection and Analysis System”, 1, U.S. Nuclear Regulatory Commission, NUREG/CR-6268, (1998);
  14. Borshchev, A., Y. Karpov, and V. Kharitonov, Distributed simulation of hybrid systems with AnyLogic and HLA. Future Generation Computer Systems, 2002. 18(6): p. 829-839 (2002).

Article full text

Download PDF