CINXE.COM

Search results for: critical infrastructure monitoring

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: critical infrastructure monitoring</title> <meta name="description" content="Search results for: critical infrastructure monitoring"> <meta name="keywords" content="critical infrastructure monitoring"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="critical infrastructure monitoring" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="critical infrastructure monitoring"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 9866</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: critical infrastructure monitoring</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9866</span> A Survey on a Critical Infrastructure Monitoring Using Wireless Sensor Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Khelifa%20Benahmed">Khelifa Benahmed</a>, <a href="https://publications.waset.org/abstracts/search?q=Tarek%20Benahmed"> Tarek Benahmed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> There are diverse applications of wireless sensor networks (WSNs) in the real world, typically invoking some kind of monitoring, tracking, or controlling activities. In an application, a WSN is deployed over the area of interest to sense and detect the events and collect data through their sensors in a geographical area and transmit the collected data to a Base Station (BS). This paper presents an overview of the research solutions available in the field of environmental monitoring applications, more precisely the problems of critical area monitoring using wireless sensor networks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure%20monitoring" title="critical infrastructure monitoring">critical infrastructure monitoring</a>, <a href="https://publications.waset.org/abstracts/search?q=environment%20monitoring" title=" environment monitoring"> environment monitoring</a>, <a href="https://publications.waset.org/abstracts/search?q=event%20region%20detection" title=" event region detection"> event region detection</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20sensor%20networks" title=" wireless sensor networks"> wireless sensor networks</a> </p> <a href="https://publications.waset.org/abstracts/75352/a-survey-on-a-critical-infrastructure-monitoring-using-wireless-sensor-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/75352.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">350</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9865</span> Protection of the Object of the Critical Infrastructure in the Czech Republic</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Michaela%20Va%C5%A1kov%C3%A1">Michaela Vašková</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the increasing dependence of countries on the critical infrastructure, it increases their vulnerability. Big threat is primarily in the human factor (personnel of the critical infrastructure) and in terrorist attacks. It emphasizes the development of methodology for searching of weak points and their subsequent elimination. This article discusses methods for the analysis of safety in the objects of critical infrastructure. It also contains proposal for methodology for training employees of security services in the objects of the critical infrastructure and developing scenarios of attacks on selected objects of the critical infrastructure. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title="critical infrastructure">critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=object%20of%20critical%20infrastructure" title=" object of critical infrastructure"> object of critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=protection" title=" protection"> protection</a>, <a href="https://publications.waset.org/abstracts/search?q=safety" title=" safety"> safety</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20audit" title=" security audit"> security audit</a> </p> <a href="https://publications.waset.org/abstracts/39230/protection-of-the-object-of-the-critical-infrastructure-in-the-czech-republic" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39230.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">344</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9864</span> The Application of the Security Audit Method on the Selected Objects of Critical Infrastructure</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Michaela%20Va%C5%A1kov%C3%A1">Michaela Vašková</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper is focused on the application of the security audit method on the selected objects of the critical infrastructure. The emphasis is put on security audit method to find gaps in the critical infrastructure security. The theoretical part describes objects of the critical infrastructure. The practical part describes using the security audit method. The main emphasis was put on the protection of the critical infrastructure in the Czech Republic. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crisis%20management" title="crisis management">crisis management</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title=" critical infrastructure"> critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=object%20of%20critical%20infrastructure" title=" object of critical infrastructure"> object of critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20audit" title=" security audit"> security audit</a>, <a href="https://publications.waset.org/abstracts/search?q=extraordinary%20event" title=" extraordinary event"> extraordinary event</a> </p> <a href="https://publications.waset.org/abstracts/38760/the-application-of-the-security-audit-method-on-the-selected-objects-of-critical-infrastructure" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/38760.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">431</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9863</span> Application Potential of Selected Tools in Context of Critical Infrastructure Protection and Risk Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hromada%20Martin">Hromada Martin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Risk analysis is considered as a fundamental aspect relevant for ensuring the level of critical infrastructure protection, where the critical infrastructure is seen as system, asset or its part which is important for maintaining the vital societal functions. Article actually discusses and analyzes the potential application of selected tools of information support for the implementation and within the framework of risk analysis and critical infrastructure protection. Use of the information in relation to their risk analysis can be viewed as a form of simplifying the analytical process. It is clear that these instruments (information support) for these purposes are countless, so they were selected representatives who have already been applied in the selected area of critical infrastructure, or they can be used. All presented fact were the basis for critical infrastructure resilience evaluation methodology development. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title="critical infrastructure">critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=protection" title=" protection"> protection</a>, <a href="https://publications.waset.org/abstracts/search?q=resilience" title=" resilience"> resilience</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20analysis" title=" risk analysis"> risk analysis</a> </p> <a href="https://publications.waset.org/abstracts/21150/application-potential-of-selected-tools-in-context-of-critical-infrastructure-protection-and-risk-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21150.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">638</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9862</span> The Use of Crisis Workplace Technology to Protect Communication Processes of Critical Infrastructure</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jiri%20Barta">Jiri Barta</a>, <a href="https://publications.waset.org/abstracts/search?q=Ji%C5%99%C3%AD%20F.%20Urbanek"> Jiří F. Urbanek</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper deals with a protection of the national and European infrastructure. It is issue nowadays. The paper deals with the perspectives and possibilities of "smart solutions" to critical infrastructure protection. The research project deals with computers aided technologies are used from the perspective of new, better protection of selected infrastructure objects. Protection is focused on communication and information channels. These communication and information channels are very important for the functioning of the system of protection of critical infrastructure elements. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=interoperability" title="interoperability">interoperability</a>, <a href="https://publications.waset.org/abstracts/search?q=communication%20systems" title=" communication systems"> communication systems</a>, <a href="https://publications.waset.org/abstracts/search?q=controlling%20proces" title=" controlling proces"> controlling proces</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title=" critical infrastructure"> critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=crisis%20workplaces" title=" crisis workplaces"> crisis workplaces</a>, <a href="https://publications.waset.org/abstracts/search?q=continuity" title=" continuity"> continuity</a> </p> <a href="https://publications.waset.org/abstracts/17844/the-use-of-crisis-workplace-technology-to-protect-communication-processes-of-critical-infrastructure" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17844.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">299</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9861</span> Identification Algorithm of Critical Interface, Modelling Perils on Critical Infrastructure Subjects</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ji%C5%99%C3%AD.%20J.%20Urb%C3%A1nek">Jiří. J. Urbánek</a>, <a href="https://publications.waset.org/abstracts/search?q=Hana%20Malachov%C3%A1"> Hana Malachová</a>, <a href="https://publications.waset.org/abstracts/search?q=Josef%20Krahulec"> Josef Krahulec</a>, <a href="https://publications.waset.org/abstracts/search?q=Jitka%20Johanidisov%C3%A1"> Jitka Johanidisová</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper deals with crisis situations investigation and modelling within the organizations of critical infrastructure. Every crisis situation has an origin in the emergency event occurrence in the organizations of energetic critical infrastructure especially. Here, the emergency events can be both the expected events, then crisis scenarios can be pre-prepared by pertinent organizational crisis management authorities towards their coping or the unexpected event (Black Swan effect) – without pre-prepared scenario, but it needs operational coping of crisis situations as well. The forms, characteristics, behaviour and utilization of crisis scenarios have various qualities, depending on real critical infrastructure organization prevention and training processes. An aim is always better organizational security and continuity obtainment. This paper objective is to find and investigate critical/ crisis zones and functions in critical situations models of critical infrastructure organization. The DYVELOP (Dynamic Vector Logistics of Processes) method is able to identify problematic critical zones and functions, displaying critical interfaces among actors of crisis situations on the DYVELOP maps named Blazons. Firstly, for realization of this ability is necessary to derive and create identification algorithm of critical interfaces. The locations of critical interfaces are the flags of crisis situation in real organization of critical infrastructure. Conclusive, the model of critical interface will be displayed at real organization of Czech energetic crisis infrastructure subject in Black Out peril environment. The Blazons need live power Point presentation for better comprehension of this paper mission. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=algorithm" title="algorithm">algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=crisis" title=" crisis"> crisis</a>, <a href="https://publications.waset.org/abstracts/search?q=DYVELOP" title=" DYVELOP"> DYVELOP</a>, <a href="https://publications.waset.org/abstracts/search?q=infrastructure" title=" infrastructure"> infrastructure</a> </p> <a href="https://publications.waset.org/abstracts/38771/identification-algorithm-of-critical-interface-modelling-perils-on-critical-infrastructure-subjects" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/38771.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">408</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9860</span> Vulnerability Assessment of Healthcare Interdependent Critical Infrastructure Coloured Petri Net Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=N.%20Nivedita">N. Nivedita</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Durbha"> S. Durbha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Critical Infrastructure (CI) consists of services and technological networks such as healthcare, transport, water supply, electricity supply, information technology etc. These systems are necessary for the well-being and to maintain effective functioning of society. Critical Infrastructures can be represented as nodes in a network where they are connected through a set of links depicting the logical relationship among them; these nodes are interdependent on each other and interact with each at other at various levels, such that the state of each infrastructure influences or is correlated to the state of another. Disruption in the service of one infrastructure nodes of the network during a disaster would lead to cascading and escalating disruptions across other infrastructures nodes in the network. The operation of Healthcare Infrastructure is one such Critical Infrastructure that depends upon a complex interdependent network of other Critical Infrastructure, and during disasters it is very vital for the Healthcare Infrastructure to be protected, accessible and prepared for a mass casualty. To reduce the consequences of a disaster on the Critical Infrastructure and to ensure a resilient Critical Health Infrastructure network, knowledge, understanding, modeling, and analyzing the inter-dependencies between the infrastructures is required. The paper would present inter-dependencies related to Healthcare Critical Infrastructure based on Hierarchical Coloured Petri Nets modeling approach, given a flood scenario as the disaster which would disrupt the infrastructure nodes. The model properties are being analyzed for the various state changes which occur when there is a disruption or damage to any of the Critical Infrastructure. The failure probabilities for the failure risk of interconnected systems are calculated by deriving a reachability graph, which is later mapped to a Markov chain. By analytically solving and analyzing the Markov chain, the overall vulnerability of the Healthcare CI HCPN model is demonstrated. The entire model would be integrated with Geographic information-based decision support system to visualize the dynamic behavior of the interdependency of the Healthcare and related CI network in a geographically based environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure%20interdependency" title="critical infrastructure interdependency">critical infrastructure interdependency</a>, <a href="https://publications.waset.org/abstracts/search?q=hierarchical%20coloured%20petrinet" title=" hierarchical coloured petrinet"> hierarchical coloured petrinet</a>, <a href="https://publications.waset.org/abstracts/search?q=healthcare%20critical%20infrastructure" title=" healthcare critical infrastructure"> healthcare critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=Petri%20Nets" title=" Petri Nets"> Petri Nets</a>, <a href="https://publications.waset.org/abstracts/search?q=Markov%20chain" title=" Markov chain"> Markov chain</a> </p> <a href="https://publications.waset.org/abstracts/21872/vulnerability-assessment-of-healthcare-interdependent-critical-infrastructure-coloured-petri-net-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21872.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">529</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9859</span> Overview of Development of a Digital Platform for Building Critical Infrastructure Protection Systems in Smart Industries</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bruno%20Vili%C4%87%20Belina">Bruno Vilić Belina</a>, <a href="https://publications.waset.org/abstracts/search?q=Ivan%20%C5%BDupan"> Ivan Župan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Smart industry concepts and digital transformation are very popular in many industries. They develop their own digital platforms, which have an important role in innovations and transactions. The main idea of smart industry digital platforms is central data collection, industrial data integration, and data usage for smart applications and services. This paper presents the development of a digital platform for building critical infrastructure protection systems in smart industries. Different service contraction modalities in service level agreements (SLAs), customer relationship management (CRM) relations, trends, and changes in business architectures (especially process business architecture) for the purpose of developing infrastructural production and distribution networks, information infrastructure meta-models and generic processes by critical infrastructure owner demanded by critical infrastructure law, satisfying cybersecurity requirements and taking into account hybrid threats are researched. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title="cybersecurity">cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title=" critical infrastructure"> critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20industries" title=" smart industries"> smart industries</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20platform" title=" digital platform"> digital platform</a> </p> <a href="https://publications.waset.org/abstracts/156688/overview-of-development-of-a-digital-platform-for-building-critical-infrastructure-protection-systems-in-smart-industries" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/156688.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">106</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9858</span> The Protection of Assets in the Crisis Management Processes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jiri%20Barta">Jiri Barta</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper deals with the prevention and management of emergencies. It focuses on the protection of assets of the critical infrastructure entities that are important to preventing, preparing for and management of emergencies and crisis situations. The paper defines assets and specifies their use and place in the process of crisis management and planning. Critical assets that are protected from the negative effects of emergency or crisis situation we can use in crisis management and response. This basic rule applies mainly to the substantial assets used in the protection of critical infrastructure processes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=asset" title="asset">asset</a>, <a href="https://publications.waset.org/abstracts/search?q=continuity" title=" continuity"> continuity</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title=" critical infrastructure"> critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=crisis%20management%20process" title=" crisis management process"> crisis management process</a> </p> <a href="https://publications.waset.org/abstracts/17936/the-protection-of-assets-in-the-crisis-management-processes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17936.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">515</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9857</span> Tsunami Vulnerability of Critical Infrastructure: Development and Application of Functions for Infrastructure Impact Assessment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=James%20Hilton%20Williams">James Hilton Williams</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Recent tsunami events, including the 2011 Tohoku Tsunami, Japan, and the 2015 Illapel Tsunami, Chile, have highlighted the potential for tsunami impacts on the built environment. International research in the tsunami impacts domain has been largely focused toward impacts on buildings and casualty estimations, while only limited attention has been placed on the impacts on infrastructure which is critical for the recovery of impacted communities. New Zealand, with 75% of the population within 10 km of the coast, has a large amount of coastal infrastructure exposed to local, regional and distant tsunami sources. To effectively manage tsunami risk for New Zealand critical infrastructure, including energy, transportation, and communications, the vulnerability of infrastructure networks and components must first be determined. This research develops infrastructure asset vulnerability, functionality and repair- cost functions based on international post-event tsunami impact assessment data from technologically similar countries, including Japan and Chile, and adapts these to New Zealand. These functions are then utilized within a New Zealand based impact framework, allowing for cost benefit analyses, effective tsunami risk management strategies and mitigation options for exposed critical infrastructure to be determined, which can also be applied internationally. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=impact%20assessment" title="impact assessment">impact assessment</a>, <a href="https://publications.waset.org/abstracts/search?q=infrastructure" title=" infrastructure"> infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=tsunami%20impacts" title=" tsunami impacts"> tsunami impacts</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerability%20functions" title=" vulnerability functions"> vulnerability functions</a> </p> <a href="https://publications.waset.org/abstracts/100776/tsunami-vulnerability-of-critical-infrastructure-development-and-application-of-functions-for-infrastructure-impact-assessment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/100776.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">161</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9856</span> Societal Resilience Assessment in the Context of Critical Infrastructure Protection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hannah%20Rosenqvist">Hannah Rosenqvist</a>, <a href="https://publications.waset.org/abstracts/search?q=Fanny%20Guay"> Fanny Guay</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Critical infrastructure protection has been an important topic for several years. Programmes such as the European Programme for Critical Infrastructure Protection (EPCIP), Critical Infrastructure Warning Information Network (CIWIN) and the European Reference Network for Critical Infrastructure Protection (ENR-CIP) have been the pillars to the work done since 2006. However, measuring critical infrastructure resilience has not been an easy task. This has to do with the fact that the concept of resilience has several definitions and is applied in different domains such as engineering and social sciences. Since June 2015, the EU project IMPROVER has been focusing on developing a methodology for implementing a combination of societal, organizational and technological resilience concepts, in the hope to increase critical infrastructure resilience. For this paper, we performed research on how to include societal resilience as a form of measurement of the context of critical infrastructure resilience. Because one of the main purposes of critical infrastructure (CI) is to deliver services to the society, we believe that societal resilience is an important factor that should be considered when assessing the overall CI resilience. We found that existing methods for CI resilience assessment focus mainly on technical aspects and therefore that is was necessary to develop a resilience model that take social factors into account. The model developed within the project IMPROVER aims to include the community’s expectations of infrastructure operators as well as information sharing with the public and planning processes. By considering such aspects, the IMPROVER framework not only helps operators to increase the resilience of their infrastructures on the technical or organizational side, but aims to strengthen community resilience as a whole. This will further be achieved by taking interdependencies between critical infrastructures into consideration. The knowledge gained during this project will enrich current European policies and practices for improved disaster risk management. The framework for societal resilience analysis is based on three dimensions for societal resilience; coping capacity, adaptive capacity and transformative capacity which are capacities that have been recognized throughout a widespread literature review in the field. A set of indicators have been defined that describe a community’s maturity within these resilience dimensions. Further, the indicators are categorized into six community assets that need to be accessible and utilized in such a way that they allow responding to changes and unforeseen circumstances. We conclude that the societal resilience model developed within the project IMPROVER can give a good indication of the level of societal resilience to critical infrastructure operators. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=community%20resilience" title="community resilience">community resilience</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure%20protection" title=" critical infrastructure protection"> critical infrastructure protection</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure%20resilience" title=" critical infrastructure resilience"> critical infrastructure resilience</a>, <a href="https://publications.waset.org/abstracts/search?q=societal%20resilience" title=" societal resilience"> societal resilience</a> </p> <a href="https://publications.waset.org/abstracts/78966/societal-resilience-assessment-in-the-context-of-critical-infrastructure-protection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/78966.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">230</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9855</span> Models, Methods and Technologies for Protection of Critical Infrastructures from Cyber-Physical Threats</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ivan%20%C5%BDupan">Ivan Župan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Critical infrastructure is essential for the functioning of a country and is designated for special protection by governments worldwide. Due to the increase in smart technology usage in every facet of the industry, including critical infrastructure, the exposure to malicious cyber-physical attacks has grown in the last few years. Proper security measures must be undertaken in order to defend against cyber-physical threats that can disrupt the normal functioning of critical infrastructure and, consequently the functioning of the country. This paper provides a review of the scientific literature of models, methods and technologies used to protect from cyber-physical threats in industries. The focus of the literature was observed from three aspects. The first aspect, resilience, concerns itself with the robustness of the system’s defense against threats, as well as preparation and education about potential future threats. The second aspect concerns security risk management for systems with cyber-physical aspects, and the third aspect investigates available testbed environments for testing developed models on scaled models of vulnerable infrastructure. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title="critical infrastructure">critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-physical%20security" title=" cyber-physical security"> cyber-physical security</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20industry" title=" smart industry"> smart industry</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20methodology" title=" security methodology"> security methodology</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20technology" title=" security technology"> security technology</a> </p> <a href="https://publications.waset.org/abstracts/169637/models-methods-and-technologies-for-protection-of-critical-infrastructures-from-cyber-physical-threats" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/169637.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">75</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9854</span> Production Structures of Energy Based on Water Force, Its Infrastructure Protection, and Possible Causes of Failure</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gabriela-Andreea%20Despescu">Gabriela-Andreea Despescu</a>, <a href="https://publications.waset.org/abstracts/search?q=M%C4%83d%C4%83lina-Elena%20Mavrodin"> Mădălina-Elena Mavrodin</a>, <a href="https://publications.waset.org/abstracts/search?q=Gheorghe%20L%C4%83z%C4%83roiu"> Gheorghe Lăzăroiu</a>, <a href="https://publications.waset.org/abstracts/search?q=Florin%20Adrian%20Gr%C4%83dinaru"> Florin Adrian Grădinaru</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this paper is to contribute to the enhancement of a hydroelectric plant protection by coordinating protection measures and existing security and introducing new measures under a risk management process. Also, the plan identifies key critical elements of a hydroelectric plant, from its level vulnerabilities and threats it is subjected to in order to achieve the necessary protection measures to reduce the level of risk. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title="critical infrastructure">critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20analysis" title=" risk analysis"> risk analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure%20protection" title=" critical infrastructure protection"> critical infrastructure protection</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerability" title=" vulnerability"> vulnerability</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20management" title=" risk management"> risk management</a>, <a href="https://publications.waset.org/abstracts/search?q=turbine" title=" turbine"> turbine</a>, <a href="https://publications.waset.org/abstracts/search?q=impact%20analysis" title=" impact analysis"> impact analysis</a> </p> <a href="https://publications.waset.org/abstracts/37627/production-structures-of-energy-based-on-water-force-its-infrastructure-protection-and-possible-causes-of-failure" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/37627.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">547</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9853</span> Peril´s Environment of Energetic Infrastructure Complex System, Modelling by the Crisis Situation Algorithms </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ji%C5%99%C3%AD%20F.%20Urb%C3%A1nek">Jiří F. Urbánek</a>, <a href="https://publications.waset.org/abstracts/search?q=Alena%20Oulehlov%C3%A1"> Alena Oulehlová</a>, <a href="https://publications.waset.org/abstracts/search?q=Hana%20Malachov%C3%A1"> Hana Malachová</a>, <a href="https://publications.waset.org/abstracts/search?q=Ji%C5%99%C3%AD%20J.%20Urb%C3%A1nek%20Jr."> Jiří J. Urbánek Jr.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Crisis situations investigation and modelling are introduced and made within the complex system of energetic critical infrastructure, operating on peril´s environments. Every crisis situations and perils has an origin in the emergency/ crisis event occurrence and they need critical/ crisis interfaces assessment. Here, the emergency events can be expected - then crisis scenarios can be pre-prepared by pertinent organizational crisis management authorities towards their coping; or it may be unexpected - without pre-prepared scenario of event. But the both need operational coping by means of crisis management as well. The operation, forms, characteristics, behaviour and utilization of crisis management have various qualities, depending on real critical infrastructure organization perils, and prevention training processes. An aim is always - better security and continuity of the organization, which successful obtainment needs to find and investigate critical/ crisis zones and functions in critical infrastructure organization models, operating in pertinent perils environment. Our DYVELOP (Dynamic Vector Logistics of Processes) method is disposables for it. Here, it is necessary to derive and create identification algorithm of critical/ crisis interfaces. The locations of critical/ crisis interfaces are the flags of crisis situation in organization of critical infrastructure models. Then, the model of crisis situation will be displayed at real organization of Czech energetic crisis infrastructure subject in real peril environment. These efficient measures are necessary for the infrastructure protection. They will be derived for peril mitigation, crisis situation coping and for environmentally friendly organization survival, continuity and its sustainable development advanced possibilities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=algorithms" title="algorithms">algorithms</a>, <a href="https://publications.waset.org/abstracts/search?q=energetic%20infrastructure%20complex%20system" title=" energetic infrastructure complex system"> energetic infrastructure complex system</a>, <a href="https://publications.waset.org/abstracts/search?q=modelling" title=" modelling"> modelling</a>, <a href="https://publications.waset.org/abstracts/search?q=peril%C2%B4s%20environment" title=" peril´s environment"> peril´s environment</a> </p> <a href="https://publications.waset.org/abstracts/39510/perils-environment-of-energetic-infrastructure-complex-system-modelling-by-the-crisis-situation-algorithms" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39510.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">402</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9852</span> Strategic Thinking to Enhance Critical Transport Infrastructure and Build Resilience</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jayantha%20Withanaarachchi">Jayantha Withanaarachchi</a>, <a href="https://publications.waset.org/abstracts/search?q=Sujeeva%20Setunge"> Sujeeva Setunge</a>, <a href="https://publications.waset.org/abstracts/search?q=Sara%20Moridpour"> Sara Moridpour</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Gaps in strategic thinking and planning lead to critical transport infrastructure resilience. These gaps in strategic transport and land use development planning have an impact on communities and cities. Natural and man-induced disasters can be catastrophic to communities. After a disaster, many types of critical infrastructure, including transport infrastructure gets un-usable or gets damaged. This paper examines strategic thinking behind the resilience and protection of Critical Transport Infrastructure (CI) within transport networks by investigating the impact of disasters such as bushfires, hurricanes and earthquakes. A detailed analysis of three case studies have been conducted to identify the gaps in strategic transport planning and strategic decision making processes required to mitigate the impacts of disasters. Case studies will be analysed to identify existing gaps in road design, transport planning and decision making. This paper examines the effect of road designing, transport corridors and decision making during transport planning stages and how it impacts transport infrastructure as well as community resilience. A set of recommendations to overcome the shortcomings of existing strategic planning and designing process are presented. This research paper reviews transport infrastructure planning issues and presents the common approach suitable for future strategic thinking and planning which could be adopted in practices. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=community%20resilience" title="community resilience">community resilience</a>, <a href="https://publications.waset.org/abstracts/search?q=decision%20making" title=" decision making "> decision making </a>, <a href="https://publications.waset.org/abstracts/search?q=infrastructure%20resilience" title=" infrastructure resilience"> infrastructure resilience</a>, <a href="https://publications.waset.org/abstracts/search?q=strategic%20transport%20planning" title=" strategic transport planning"> strategic transport planning</a>, <a href="https://publications.waset.org/abstracts/search?q=transport%20infrastructure" title=" transport infrastructure"> transport infrastructure</a> </p> <a href="https://publications.waset.org/abstracts/82866/strategic-thinking-to-enhance-critical-transport-infrastructure-and-build-resilience" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/82866.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">292</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9851</span> Assessment of the Simulation Programs Usable to Support Decision Making Processes of the Critical Infrastructure Emergency Management</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ji%C5%99%C3%AD%20Barta">Jiří Barta</a>, <a href="https://publications.waset.org/abstracts/search?q=Old%C5%99ich%20Svoboda"> Oldřich Svoboda</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article deals with the issue of practical training of the management staff during emergency events in the frame of critical infrastructure. Critical infrastructure represents one of the possible targets of destructive activities as well as operational accidents and incidents which can seriously influence the functioning of the system of ensuring the basic needs of the inhabitants. Therefore, protection of critical infrastructure and training of the staff in dealing with emergencies becomes a broadly discussed topic. Nowadays, the market offers a wide range of simulation tools which proclaim that they are suitable for practical training of management staff and completing their tasks. Another group of programs declares that they are not primarily designed for this type of simulations. However, after some minor adaptations, for example by adding or changing users‘ roles, they are able to fulfil the needs of practical training as well as the process of emergency simulation. This paper characterises and selects simulators and programs for simulating emergency events. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer%20simulation" title="computer simulation">computer simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=Symos%C2%B497" title=" Symos´97"> Symos´97</a>, <a href="https://publications.waset.org/abstracts/search?q=simulation%20software" title=" simulation software"> simulation software</a>, <a href="https://publications.waset.org/abstracts/search?q=harmful%20substances" title=" harmful substances"> harmful substances</a>, <a href="https://publications.waset.org/abstracts/search?q=Konstruktivn%C3%AD%20simulace" title=" Konstruktivní simulace"> Konstruktivní simulace</a>, <a href="https://publications.waset.org/abstracts/search?q=SIMEX" title=" SIMEX"> SIMEX</a> </p> <a href="https://publications.waset.org/abstracts/39680/assessment-of-the-simulation-programs-usable-to-support-decision-making-processes-of-the-critical-infrastructure-emergency-management" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39680.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">258</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9850</span> Active Cyber Defense within the Concept of NATO’s Protection of Critical Infrastructures</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Serkan%20Ya%C4%9Fl%C4%B1">Serkan Yağlı</a>, <a href="https://publications.waset.org/abstracts/search?q=Sel%C3%A7uk%20Dal"> Selçuk Dal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cyber-attacks pose a serious threat to all states. Therefore, states constantly seek for various methods to encounter those threats. In addition, recent changes in the nature of cyber-attacks and their more complicated methods have created a new concept: active cyber defence (ACD). This article tries to answer firstly why ACD is important to NATO and find out the viewpoint of NATO towards ACD. Secondly, infrastructure protection is essential to cyber defence. Critical infrastructure protection with ACD means is even more important. It is assumed that by implementing active cyber defence, NATO may not only be able to repel the attacks but also be deterrent. Hence, the use of ACD has a direct positive effect in all international organizations’ future including NATO. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=active%20cyber%20defence" title="active cyber defence">active cyber defence</a>, <a href="https://publications.waset.org/abstracts/search?q=advanced%20persistent%20treat" title=" advanced persistent treat"> advanced persistent treat</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title=" critical infrastructure"> critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=NATO" title=" NATO"> NATO</a> </p> <a href="https://publications.waset.org/abstracts/3927/active-cyber-defense-within-the-concept-of-natos-protection-of-critical-infrastructures" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/3927.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">243</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9849</span> Requirements Engineering via Controlling Actors Definition for the Organizations of European Critical Infrastructure</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jiri%20F.%20Urbanek">Jiri F. Urbanek</a>, <a href="https://publications.waset.org/abstracts/search?q=Jiri%20Barta"> Jiri Barta</a>, <a href="https://publications.waset.org/abstracts/search?q=Oldrich%20Svoboda"> Oldrich Svoboda</a>, <a href="https://publications.waset.org/abstracts/search?q=Jiri%20J.%20Urbanek"> Jiri J. Urbanek</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The organizations of European and Czech critical infrastructure have specific position, mission, characteristics and behaviour in European Union and Czech state/ business environments, regarding specific requirements for regional and global security environments. They must respect policy of national security and global rules, requirements and standards in all their inherent and outer processes of supply-customer chains and networks. A controlling is generalized capability to have control over situational policy. This paper aims and purposes are to introduce the controlling as quite new necessary process attribute providing for critical infrastructure is environment the capability and profit to achieve its commitment regarding to the effectiveness of the quality management system in meeting customer/ user requirements and also the continual improvement of critical infrastructure organization’s processes overall performance and efficiency, as well as its societal security via continual planning improvement via DYVELOP modelling. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=added%20value" title="added value">added value</a>, <a href="https://publications.waset.org/abstracts/search?q=DYVELOP" title=" DYVELOP"> DYVELOP</a>, <a href="https://publications.waset.org/abstracts/search?q=controlling" title=" controlling"> controlling</a>, <a href="https://publications.waset.org/abstracts/search?q=environments" title=" environments"> environments</a>, <a href="https://publications.waset.org/abstracts/search?q=process%20approach" title=" process approach"> process approach</a> </p> <a href="https://publications.waset.org/abstracts/18634/requirements-engineering-via-controlling-actors-definition-for-the-organizations-of-european-critical-infrastructure" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/18634.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">412</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9848</span> Monitoring and Analysis of Bridge Crossing Ground Fissures</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zhiqing%20Zhang">Zhiqing Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiangong%20Zhou"> Xiangong Zhou</a>, <a href="https://publications.waset.org/abstracts/search?q=Zihan%20Zhou"> Zihan Zhou</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ground fissures can be seen in some cities all over the world. As a special urban geological disaster, ground fissures in Xi'an have caused great harm to infrastructure. Chang'an Road Interchange in Xi'an City is a bridge across ground fissures. The damage to Chang'an Road interchange is the most serious and typical. To study the influence of ground fissures on the bridge, we established a bridge monitoring system. The main monitoring items include elevation monitoring, structural displacement monitoring, etc. The monitoring results show that the typical failure is mainly reflected in the bridge deck damage caused by horizontal tension and vertical dislocation. For the construction of urban interchange spanning ground fissures, the interchange should be divided reasonably, a simple support structure with less restriction should be adopted, and the monitoring of supports should be strengthened to prevent the occurrence of beam falling. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bridge%20monitoring" title="bridge monitoring">bridge monitoring</a>, <a href="https://publications.waset.org/abstracts/search?q=ground%20fissures" title=" ground fissures"> ground fissures</a>, <a href="https://publications.waset.org/abstracts/search?q=typical%20disease" title=" typical disease"> typical disease</a>, <a href="https://publications.waset.org/abstracts/search?q=structural%20displacement" title=" structural displacement"> structural displacement</a> </p> <a href="https://publications.waset.org/abstracts/150133/monitoring-and-analysis-of-bridge-crossing-ground-fissures" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/150133.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">223</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9847</span> A Review of Critical Factors in Budgetary Financing of Public Infrastructure in Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Akintayo%20Opawole">Akintayo Opawole</a>, <a href="https://publications.waset.org/abstracts/search?q=Godwin%20O.%20Jagboro"> Godwin O. Jagboro</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Research efforts on infrastructure development in Nigeria had not provided adequate assessment of issues essential for policy response by the government to address infrastructure deficiency. One major gap existing in previous studies is the assessment of challenges facing the budgetary financing model. Based on a case study of Osun State in Southwestern Nigeria, factors affecting budgetary financing of public infrastructure were identified from literature and brainstorming. Respondents were: 6 architects, 4 quantity surveyors, 6 town planners, 5 estate surveyors, 4 builders, 21 engineers and 26 economists/accountants ranging from principal to director who have been involved in policy making process with respect to infrastructure development in the public service of Osun state. The identified variables were subjected to factor analysis. The Kaiser-Meyer-Olkin measure of sampling adequacy tests carried out (KMO, 0.785) showed that the data collected were adequate for the analysis and the Bartlett’s test of sphericity (0.000) showed the data upon which the analysis was carried out was reliable. Results showed that factors such as poor collaboration between the state and local government establishments, absence of credible database system and inadequate funding of maintenance were the most significant to infrastructure development in the State. Policy responses to address challenges of infrastructure development in the state were identified to focus on creation of legal framework for liberation policy, enforcement of ‘due process’ in the procurement and establishment of monitoring system for project delivery. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=development" title="development">development</a>, <a href="https://publications.waset.org/abstracts/search?q=infrastructure" title=" infrastructure"> infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=financing" title=" financing"> financing</a>, <a href="https://publications.waset.org/abstracts/search?q=procurement" title=" procurement"> procurement</a> </p> <a href="https://publications.waset.org/abstracts/24414/a-review-of-critical-factors-in-budgetary-financing-of-public-infrastructure-in-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24414.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">411</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9846</span> An Exploration of Cyberspace Security, Strategy for a New Era</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Laxmi%20R.%20Kasaraneni">Laxmi R. Kasaraneni</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Internet connects all the networks, including the nation’s critical infrastructure that are used extensively by not only a nation’s government and military to protect sensitive information and execute missions, but also the primary infrastructure that provides services that enable modern conveniences such as education, potable water, electricity, natural gas, and financial transactions. It has become the central nervous system for the government, the citizens, and the industries. When it is attacked, the effects can ripple far and wide impacts not only to citizens’ well-being but nation’s economy, civil infrastructure, and national security. As such, these critical services may be targeted by malicious hackers during cyber warfare, it is imperative to not only protect them and mitigate any immediate or potential threats, but to also understand the current or potential impacts beyond the IT networks or the organization. The Nation’s IT infrastructure which is now vital for communication, commerce, and control of our physical infrastructure, is highly vulnerable to attack. While existing technologies can address some vulnerabilities, fundamentally new architectures and technologies are needed to address the larger structural insecurities of an infrastructure developed in a more trusting time when mass cyber attacks were not foreseen. This research is intended to improve the core functions of the Internet and critical-sector information systems by providing a clear path to create a safe, secure, and resilient cyber environment that help stakeholders at all levels of government, and the private sector work together to develop the cybersecurity capabilities that are key to our economy, national security, and public health and safety. This research paper also emphasizes the present and future cyber security threats, the capabilities and goals of cyber attackers, a strategic concept and steps to implement cybersecurity for maximum effectiveness, enabling technologies, some strategic assumptions and critical challenges, and the future of cyberspace. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20challenges" title="critical challenges">critical challenges</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title=" critical infrastructure"> critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20security" title=" cyber security"> cyber security</a>, <a href="https://publications.waset.org/abstracts/search?q=enabling%20technologies" title=" enabling technologies"> enabling technologies</a>, <a href="https://publications.waset.org/abstracts/search?q=national%20security" title=" national security "> national security </a> </p> <a href="https://publications.waset.org/abstracts/24419/an-exploration-of-cyberspace-security-strategy-for-a-new-era" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24419.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">294</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9845</span> A Case Study on the Guidelines for Application of Project Management Methods in Infrastructure Projects</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fernanda%20Varella%20Borges">Fernanda Varella Borges</a>, <a href="https://publications.waset.org/abstracts/search?q=Silvio%20Burrattino%20Melhado"> Silvio Burrattino Melhado</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Motivated by the importance of public infrastructure projects in the civil construction chain, this research shows the study of project management methods and the infrastructure projects’ characteristics. The research aims at the objective of improving management efficiency by proposing guidelines for the application of project management methods in infrastructure projects. Through literature review and case studies, the research analyses two major infrastructure projects underway in Brazil, identifying the critical points for achieving its success. As a result, the proposed guidelines indicate that special attention should be given to the management of stakeholders, focusing on their knowledge and experience, their different interests, the efficient management of their communication, and their behavior in the day-by-day project management process. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=construction" title="construction">construction</a>, <a href="https://publications.waset.org/abstracts/search?q=infrastructure" title=" infrastructure"> infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=project%20management" title=" project management"> project management</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20projects" title=" public projects"> public projects</a> </p> <a href="https://publications.waset.org/abstracts/82714/a-case-study-on-the-guidelines-for-application-of-project-management-methods-in-infrastructure-projects" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/82714.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">494</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9844</span> A Cellular-Based Structural Health Monitoring Device (HMD) Based on Cost-Effective 1-Axis Accelerometers</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chih-Hsing%20Lin">Chih-Hsing Lin</a>, <a href="https://publications.waset.org/abstracts/search?q=Wen-Ching%20Chen"> Wen-Ching Chen</a>, <a href="https://publications.waset.org/abstracts/search?q=Chih-Ting%20Kuo"> Chih-Ting Kuo</a>, <a href="https://publications.waset.org/abstracts/search?q=Gang-Neng%20Sung"> Gang-Neng Sung</a>, <a href="https://publications.waset.org/abstracts/search?q=Chih-Chyau%20Yang"> Chih-Chyau Yang</a>, <a href="https://publications.waset.org/abstracts/search?q=Chien-Ming%20Wu"> Chien-Ming Wu</a>, <a href="https://publications.waset.org/abstracts/search?q=Chun-Ming%20Huang"> Chun-Ming Huang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper proposes a cellular-based structure health monitoring device (HMD) for temporary bridge monitoring without the requirement of power line and internet service. The proposed HMD includes sensor node, power module, cellular gateway, and rechargeable batteries. The purpose of HMD focuses on short-term collection of civil infrastructure information. It achieves the features of low cost by using three 1-axis accelerometers with data synchronization problem being solved. Furthermore, instead of using data acquisition system (DAQ) sensed data is transmitted to Host through cellular gateway. Compared with 3-axis accelerometer, our proposed 1-axis accelerometers based device achieves 50.5% cost saving with high sensitivity 2000mv/g. In addition to fit different monitoring environments, the proposed system can be easily replaced and/or extended with different PCB boards, such as communication interfaces and sensors, to adapt to various applications. Therefore, with using the proposed device, the real-time diagnosis system for civil infrastructure damage monitoring can be conducted effectively. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cellular-based%20structural%20health%20monitoring" title="cellular-based structural health monitoring">cellular-based structural health monitoring</a>, <a href="https://publications.waset.org/abstracts/search?q=cost-effective%201-axis%20accelerometers" title=" cost-effective 1-axis accelerometers"> cost-effective 1-axis accelerometers</a>, <a href="https://publications.waset.org/abstracts/search?q=short-term%20monitoring" title=" short-term monitoring"> short-term monitoring</a>, <a href="https://publications.waset.org/abstracts/search?q=structural%20engineering" title=" structural engineering"> structural engineering</a> </p> <a href="https://publications.waset.org/abstracts/25611/a-cellular-based-structural-health-monitoring-device-hmd-based-on-cost-effective-1-axis-accelerometers" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25611.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">517</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9843</span> Rebuilding Christchurch&#039;s Infrastructure: An Analysis of Political Mismanagement</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hugh%20Byrd">Hugh Byrd</a>, <a href="https://publications.waset.org/abstracts/search?q=Steve%20Matthewnan"> Steve Matthewnan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The devastation of the city centre of Christchurch, New Zealand, after the 2010 and 2011 earthquakes presented an opportunity to rebuild infrastructure in a coordinated and efficient manner to allow for a city that was energy efficient, low carbon, resilient and provided both energy security and justice. The research described in this paper records the processes taken to attempt to rebuild the energy infrastructure. The story is one of political decisions overriding appropriate technology and ultimately is a lesson in how not to handle the implementation of post-disaster energy infrastructure. Lack of clarity in decision making by central government and then not pursuing consultant’s recommendations led to a scheme that was effectively abandoned in 2016 and described as ‘a total failure’. The paper records the critical events that occurred and explains why the proposed energy infrastructure was both politically and technologically inappropriate. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=energy%20infrastructure" title="energy infrastructure">energy infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=policy%20and%20governance" title=" policy and governance"> policy and governance</a>, <a href="https://publications.waset.org/abstracts/search?q=post-disaster%20rebuilding" title=" post-disaster rebuilding"> post-disaster rebuilding</a> </p> <a href="https://publications.waset.org/abstracts/102732/rebuilding-christchurchs-infrastructure-an-analysis-of-political-mismanagement" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/102732.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">172</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9842</span> Structural Health Monitoring of Buildings and Infrastructure</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mojtaba%20Valinejadshoubi">Mojtaba Valinejadshoubi</a>, <a href="https://publications.waset.org/abstracts/search?q=Ashutosh%20Bagchi"> Ashutosh Bagchi</a>, <a href="https://publications.waset.org/abstracts/search?q=Osama%20Moselhi"> Osama Moselhi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Structures such as buildings, bridges, dams, wind turbines etc. need to be maintained against various factors such as deterioration, excessive loads, environment, temperature, etc. Choosing an appropriate monitoring system is important for determining any critical damage to a structure and address that to avoid any adverse consequence. Structural Health Monitoring (SHM) has emerged as an effective technique to monitor the health of the structures. SHM refers to an ongoing structural performance assessment using different kinds of sensors attached to or embedded in the structures to evaluate their integrity and safety to help engineers decide on rehabilitation measures. Ability of SHM in identifying the location and severity of structural damages by considering any changes in characteristics of the structures such as their frequency, stiffness and mode shapes helps engineers to monitor the structures and take the most effective corrective actions to maintain their safety and extend their service life. The main objective of this study is to review the overall SHM process specifically determining the natural frequency of an instrumented simply-supported concrete beam using modal testing and finite element model updating. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=structural%20health%20monitoring" title="structural health monitoring">structural health monitoring</a>, <a href="https://publications.waset.org/abstracts/search?q=natural%20frequency" title=" natural frequency"> natural frequency</a>, <a href="https://publications.waset.org/abstracts/search?q=modal%20analysis" title=" modal analysis"> modal analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=finite%20element%20model%20updating" title=" finite element model updating"> finite element model updating</a> </p> <a href="https://publications.waset.org/abstracts/50371/structural-health-monitoring-of-buildings-and-infrastructure" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50371.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">338</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9841</span> Critical Evaluation of Groundwater Monitoring Networks for Machine Learning Applications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pedro%20Martinez-Santos">Pedro Martinez-Santos</a>, <a href="https://publications.waset.org/abstracts/search?q=V%C3%ADctor%20G%C3%B3mez-Escalonilla"> Víctor Gómez-Escalonilla</a>, <a href="https://publications.waset.org/abstracts/search?q=Silvia%20D%C3%ADaz-Alcaide"> Silvia Díaz-Alcaide</a>, <a href="https://publications.waset.org/abstracts/search?q=Esperanza%20Montero"> Esperanza Montero</a>, <a href="https://publications.waset.org/abstracts/search?q=Miguel%20Mart%C3%ADn-Loeches"> Miguel Martín-Loeches</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Groundwater monitoring networks are critical in evaluating the vulnerability of groundwater resources to depletion and contamination, both in space and time. Groundwater monitoring networks typically grow over decades, often in organic fashion, with relatively little overall planning. The groundwater monitoring networks in the Madrid area, Spain, were reviewed for the purpose of identifying gaps and opportunities for improvement. Spatial analysis reveals the presence of various monitoring networks belonging to different institutions, with several hundred observation wells in an area of approximately 4000 km2. This represents several thousand individual data entries, some going back to the early 1970s. Major issues included overlap between the networks, unknown screen depth/vertical distribution for many observation boreholes, uneven time series, uneven monitored species, and potentially suboptimal locations. Results also reveal there is sufficient information to carry out a spatial and temporal analysis of groundwater vulnerability based on machine learning applications. These can contribute to improve the overall planning of monitoring networks’ expansion into the future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=groundwater%20monitoring" title="groundwater monitoring">groundwater monitoring</a>, <a href="https://publications.waset.org/abstracts/search?q=observation%20networks" title=" observation networks"> observation networks</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=madrid" title=" madrid"> madrid</a> </p> <a href="https://publications.waset.org/abstracts/173455/critical-evaluation-of-groundwater-monitoring-networks-for-machine-learning-applications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/173455.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">78</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9840</span> Modeling of Timing in a Cyber Conflict to Inform Critical Infrastructure Defense</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Brian%20Connett">Brian Connett</a>, <a href="https://publications.waset.org/abstracts/search?q=Bryan%20O%27Halloran"> Bryan O&#039;Halloran</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Systems assets within critical infrastructures were seemingly safe from the exploitation or attack by nefarious cyberspace actors. Now, critical infrastructure is a target and the resources to exploit the cyber physical systems exist. These resources are characterized in terms of patience, stealth, replication-ability and extraordinary robustness. System owners are obligated to maintain a high level of protection measures. The difficulty lies in knowing when to fortify a critical infrastructure against an impending attack. Models currently exist that demonstrate the value of knowing the attacker’s capabilities in the cyber realm and the strength of the target. The shortcomings of these models are that they are not designed to respond to the inherent fast timing of an attack, an impetus that can be derived based on open-source reporting, common knowledge of exploits of and the physical architecture of the infrastructure. A useful model will inform systems owners how to align infrastructure architecture in a manner that is responsive to the capability, willingness and timing of the attacker. This research group has used an existing theoretical model for estimating parameters, and through analysis, to develop a decision tool for would-be target owners. The continuation of the research develops further this model by estimating the variable parameters. Understanding these parameter estimations will uniquely position the decision maker to posture having revealed the vulnerabilities of an attacker’s, persistence and stealth. This research explores different approaches to improve on current attacker-defender models that focus on cyber threats. An existing foundational model takes the point of view of an attacker who must decide what cyber resource to use and when to use it to exploit a system vulnerability. It is valuable for estimating parameters for the model, and through analysis, develop a decision tool for would-be target owners. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title="critical infrastructure">critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20physical%20systems" title=" cyber physical systems"> cyber physical systems</a>, <a href="https://publications.waset.org/abstracts/search?q=modeling" title=" modeling"> modeling</a>, <a href="https://publications.waset.org/abstracts/search?q=exploitation" title=" exploitation"> exploitation</a> </p> <a href="https://publications.waset.org/abstracts/56665/modeling-of-timing-in-a-cyber-conflict-to-inform-critical-infrastructure-defense" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/56665.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">192</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9839</span> An Investigation on Organisation Cyber Resilience </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arniyati%20Ahmad">Arniyati Ahmad</a>, <a href="https://publications.waset.org/abstracts/search?q=Christopher%20Johnson"> Christopher Johnson</a>, <a href="https://publications.waset.org/abstracts/search?q=Timothy%20Storer"> Timothy Storer</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cyber exercises used to assess the preparedness of a community against cyber crises, technology failures and critical information infrastructure (CII) incidents. The cyber exercises also called cyber crisis exercise or cyber drill, involved partnerships or collaboration of public and private agencies from several sectors. This study investigates organisation cyber resilience (OCR) of participation sectors in cyber exercise called X Maya in Malaysia. This study used a principal based cyber resilience survey called C-Suite Executive checklist developed by World Economic Forum in 2012. To ensure suitability of the survey to investigate the OCR, the reliability test was conducted on C-Suite Executive checklist items. The research further investigates the differences of OCR in ten Critical National Infrastructure Information (CNII) sectors participated in the cyber exercise. The One Way ANOVA test result showed a statistically significant difference of OCR among ten CNII sectors participated in the cyber exercise. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20information%20infrastructure" title="critical information infrastructure">critical information infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20resilience" title=" cyber resilience"> cyber resilience</a>, <a href="https://publications.waset.org/abstracts/search?q=organisation%20cyber%20resilience" title=" organisation cyber resilience"> organisation cyber resilience</a>, <a href="https://publications.waset.org/abstracts/search?q=reliability%20test" title=" reliability test"> reliability test</a> </p> <a href="https://publications.waset.org/abstracts/29946/an-investigation-on-organisation-cyber-resilience" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29946.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">358</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9838</span> Microbial Diversity Assessment in Household Point-of-Use Water Sources Using Spectroscopic Approach</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Syahidah%20N.%20Zulkifli">Syahidah N. Zulkifli</a>, <a href="https://publications.waset.org/abstracts/search?q=Herlina%20A.%20Rahim"> Herlina A. Rahim</a>, <a href="https://publications.waset.org/abstracts/search?q=Nurul%20A.%20M.%20Subha"> Nurul A. M. Subha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Sustaining water quality is critical in order to avoid any harmful health consequences for end-user consumers. The detection of microbial impurities at the household level is the foundation of water security. Water quality is now monitored only at water utilities or infrastructure, such as water treatment facilities or reservoirs. This research provides a first-hand scientific understanding of microbial composition presence in Malaysia’s household point-of-use (POUs) water supply influenced by seasonal fluctuations, standstill periods, and flow dynamics by using the NIR-Raman spectroscopic technique. According to the findings, 20% of water samples were contaminated by pathogenic bacteria, which are Legionella and Salmonella cells. A comparison of the spectra reveals significant signature peaks (420 cm⁻¹ to 1800 cm⁻¹), including species-specific bands. This demonstrates the importance of regularly monitoring POUs water quality to provide a safe and clean water supply to homeowners. Conventional Raman spectroscopy, up-to-date, is no longer suited for real-time monitoring. Therefore, this study introduced an alternative micro-spectrometer to give a rapid and sustainable way of monitoring POUs water quality. Assessing microbiological threats in water supply becomes more reliable and efficient by leveraging IoT protocol. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=microbial%20contaminants" title="microbial contaminants">microbial contaminants</a>, <a href="https://publications.waset.org/abstracts/search?q=water%20quality" title=" water quality"> water quality</a>, <a href="https://publications.waset.org/abstracts/search?q=water%20monitoring" title=" water monitoring"> water monitoring</a>, <a href="https://publications.waset.org/abstracts/search?q=Raman%20spectroscopy" title=" Raman spectroscopy"> Raman spectroscopy</a> </p> <a href="https://publications.waset.org/abstracts/168278/microbial-diversity-assessment-in-household-point-of-use-water-sources-using-spectroscopic-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168278.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">110</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9837</span> Computational Assistance of the Research, Using Dynamic Vector Logistics of Processes for Critical Infrastructure Subjects Continuity</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Urb%C3%A1nek%20Ji%C5%99%C3%AD%20J.">Urbánek Jiří J.</a>, <a href="https://publications.waset.org/abstracts/search?q=Krahulec%20Josef"> Krahulec Josef</a>, <a href="https://publications.waset.org/abstracts/search?q=Urb%C3%A1nek%20Ji%C5%99%C3%AD%20F."> Urbánek Jiří F.</a>, <a href="https://publications.waset.org/abstracts/search?q=Johanidesov%C3%A1%20Jitka"> Johanidesová Jitka</a> </p> <p class="card-text"><strong>Abstract:</strong></p> These Computational assistance for the research and modelling of critical infrastructure subjects continuity deal with this paper. It enables us the using of prevailing operation system MS Office (SmartArt...) for mathematical models, using DYVELOP (Dynamic Vector Logistics of Processes) method. It serves for crisis situations investigation and modelling within the organizations of critical infrastructure. In the first part of the paper, it will be introduced entities, operators and actors of DYVELOP method. It uses just three operators of Boolean algebra and four types of the entities: the Environments, the Process Systems, the Cases and the Controlling. The Process Systems (PrS) have five “brothers”: Management PrS, Transformation PrS, Logistic PrS, Event PrS and Operation PrS. The Cases have three “sisters”: Process Cell Case, Use Case and Activity Case. They all need for the controlling of their functions special Ctrl actors, except ENV – it can do without Ctrl. Model´s maps are named the Blazons and they are able mathematically - graphically express the relationships among entities, actors and processes. In the second part of this paper, the rich blazons of DYVELOP method will be used for the discovering and modelling of the cycling cases and their phases. The blazons need live PowerPoint presentation for better comprehension of this paper mission. The crisis management of energetic crisis infrastructure organization is obliged to use the cycles for successful coping of crisis situations. Several times cycling of these cases is a necessary condition for the encompassment of the both the emergency event and the mitigation of organization´s damages. Uninterrupted and continuous cycling process bring for crisis management fruitfulness and it is a good indicator and controlling actor of organizational continuity and its sustainable development advanced possibilities. The research reliable rules are derived for the safety and reliable continuity of energetic critical infrastructure organization in the crisis situation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blazons" title="blazons">blazons</a>, <a href="https://publications.waset.org/abstracts/search?q=computational%20assistance" title=" computational assistance"> computational assistance</a>, <a href="https://publications.waset.org/abstracts/search?q=DYVELOP%20method" title=" DYVELOP method"> DYVELOP method</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title=" critical infrastructure"> critical infrastructure</a> </p> <a href="https://publications.waset.org/abstracts/38770/computational-assistance-of-the-research-using-dynamic-vector-logistics-of-processes-for-critical-infrastructure-subjects-continuity" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/38770.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">382</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure%20monitoring&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure%20monitoring&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure%20monitoring&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure%20monitoring&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure%20monitoring&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure%20monitoring&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure%20monitoring&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure%20monitoring&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure%20monitoring&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure%20monitoring&amp;page=328">328</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure%20monitoring&amp;page=329">329</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure%20monitoring&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10