|
|
|
|
| LEADER |
09413nam a22004813i 4500 |
| 001 |
EBC6422555 |
| 003 |
MiAaPQ |
| 005 |
20231204023215.0 |
| 006 |
m o d | |
| 007 |
cr cnu|||||||| |
| 008 |
231204s2017 xx o ||||0 eng d |
| 020 |
|
|
|a 9783319510439
|q (electronic bk.)
|
| 020 |
|
|
|z 9783319510422
|
| 035 |
|
|
|a (MiAaPQ)EBC6422555
|
| 035 |
|
|
|a (Au-PeEL)EBL6422555
|
| 035 |
|
|
|a (OCoLC)1076236359
|
| 040 |
|
|
|a MiAaPQ
|b eng
|e rda
|e pn
|c MiAaPQ
|d MiAaPQ
|
| 050 |
|
4 |
|a TA352-356
|
| 100 |
1 |
|
|a Setola, Roberto.
|
| 245 |
1 |
0 |
|a Managing the Complexity of Critical Infrastructures :
|b A Modelling and Simulation Approach.
|
| 250 |
|
|
|a 1st ed.
|
| 264 |
|
1 |
|a Cham :
|b Springer International Publishing AG,
|c 2017.
|
| 264 |
|
4 |
|c ©2016.
|
| 300 |
|
|
|a 1 online resource (300 pages)
|
| 336 |
|
|
|a text
|b txt
|2 rdacontent
|
| 337 |
|
|
|a computer
|b c
|2 rdamedia
|
| 338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
| 490 |
1 |
|
|a Studies in Systems, Decision and Control Series ;
|v v.90
|
| 505 |
0 |
|
|a Intro -- Preface -- Contents -- 1 Critical Infrastructures, Protection and Resilience -- Abstract -- 1 Introduction -- 2 Importance of Protection and Resilience -- 3 Government Initiatives: Policies and Research -- 3.1 The US Approach -- 3.2 Initiatives in Europe -- 3.3 The Australian Approach -- 4 CI Resilience -- 5 Conclusion -- Acknowledgement and Disclaimer -- References -- 2 Modelling Dependencies Between Critical Infrastructures -- Abstract -- 1 Introduction -- 2 Why Are Dependencies Important? -- 3 Dependencies and Interdependencies -- 4 Dependency Modeling Approaches -- 5 Holistic Approaches -- 6 Networked Based Approaches -- 7 Conclusions -- Acknowledgement and Disclaimer -- References -- 3 Critical Infrastructure Disruption Scenarios Analyses via Simulation -- Abstract -- 1 Introduction -- 2 Scenarios Simulation -- 2.1 Types of Models -- 2.2 Scenarios' Basic Elements -- 2.3 Identification and Specification of Threats and Consequences -- 2.4 Modelling and Simulation of Threats and Consequences -- 2.5 Modelling and Simulation of CIs' Cascade of Disruptions -- 2.5.1 Vulnerability -- 2.5.2 CI Dependency -- 2.5.3 Integrating Vulnerability and Dependency -- 2.6 Cascading of Disruptions -- 2.7 The Story Time-Line -- 3 A Hypothetical Crisis Scenario -- 3.1 Crisis Scenario Description -- 3.2 Identification and Specification of the Threat -- 3.3 Identification and Specification of the CIs and Their Vulnerability -- 3.4 Specification of the CIs Dependency -- 3.5 Definition of the Cascade of Disruptions -- 3.6 Definition of the Crisis Management Target -- 3.7 The Consequence to Mitigate or to Dump -- 3.8 Scenario Assessment: Simulation and Analysis -- 3.8.1 Whey the Unstressed Case? -- 3.8.2 Unstressed Case -- 3.8.3 Stressed Case -- 4 Conclusions -- Acknowledgement and Disclaimer -- References -- 4 Physical Simulators of Critical Infrastructures.
|
| 505 |
8 |
|
|a Abstract -- 1 Introduction -- 2 Power Systems -- 2.1 DIgSILENT PowerFactory -- 2.2 SIEMENS PSS® E -- 2.3 SIEMENS PSS® SINCAL -- 2.4 SIEMENS PSS® NETOMAC -- 2.5 MATLAB® Simulink® -- 2.6 PowerWorld Simulator -- 2.7 PSCAD™ EMTDC™ -- 2.8 EMTP-RV -- 3 Telecommunication Networks -- 3.1 ns-2 -- 3.2 Other Simulators -- 4 Water Networks and Urban Drainage -- 4.1 Design Phase -- 4.2 Construction and Commissioning Phase -- 4.3 Operation and Maintenance (O& -- M) Phase -- 5 Transportation Systems -- 6 Conclusions -- Acknowledgement and Disclaimer -- References -- 5 Phenomenological Simulators of Critical Infrastructures -- Abstract -- 1 Introduction -- 2 Phenomenological Approaches -- 2.1 Leontief I/O Models -- 2.1.1 ENEA Extended Leontief Models -- 2.2 System Dynamics -- 2.3 i2SIM -- 3 Topological Analysis -- 4 A CI MA& -- S Platform for Complex and Large Scenarios -- 5 Conclusion -- Acknowledgement and Disclaimer -- References -- 6 Federated Simulations -- Abstract -- 1 Introduction -- 2 Distributed Simulation -- 2.1 Introduction -- 2.2 Levels of Interoperability -- 2.3 Approach for Coupling Simulation Models -- 3 Overview of the High Level Architecture -- 3.1 Introduction -- 3.2 Framework and Rules -- 3.3 Interface Specification -- 3.4 Object Model Template Specification -- 3.5 HLA RTI Implementations -- 4 Distributed Simulation Environment Development -- 5 Federation Agreements Template -- 6 Summary -- Acknowledgement and Disclaimer -- References -- 7 Cyber Threats Impacting Critical Infrastructures -- Abstract -- 1 Introduction -- 2 Goals and Challenges -- 2.1 Cyber World and Real Impact-Selected Case Studies -- 2.2 The Coordinated Cyber Attack-Ukrainian Case -- 2.3 Hybrid Conflicts -- 3 Cyber Threats Taxonomies -- 4 CIP Cyber-Physical Security Life-Cycle Models -- 4.1 Pre-crisis Phase -- 4.1.1 Prevention and Proactive Response.
|
| 505 |
8 |
|
|a 4.1.2 Threat Detection -- 4.2 Crisis Phase -- 4.3 Post-crisis Phase -- 5 Modelling Cyber Security Aspects -- 5.1 Network Modelling -- 5.2 Cyber Risk Assessment -- 5.3 System Behaviour and Attacks Modelling -- 6 Ongoing Efforts -- 6.1 H2020 Work Program View on CPS Aspects -- 6.2 Security Standards for Critical Infrastructures -- 7 Conclusions -- Acknowledgement and Disclaimer -- References -- 8 Verification and Validation for CIPRNet -- Abstract -- 1 Do V& -- V If There Is Risk Involved -- 1.1 Modelling and Simulation -- 1.2 Verification and Validation -- 1.3 But How to Do V& -- V, and How Much? -- 2 Do V& -- V in a Structured Way to Be More Effective and Efficient -- 2.1 Conceptual Framework -- 2.1.1 Links to Systems Engineering -- 2.1.2 M& -- S-Based Problem Solving Approach -- 2.1.3 V& -- V Problem Solving Approach -- 2.1.4 Acceptance Recommendation, Acceptability Criteria and Evidential Quality -- 2.1.5 V& -- V Argumentation Approach: Structured Reasoning with Arguments -- 2.1.6 V& -- V Organizational and Management Approach -- 2.1.7 V& -- V Levels of Independence: Acceptance, Certification and Accreditation -- 2.1.8 V& -- V Information and Knowledge Management -- 2.2 Implementation Framework -- 2.3 Tailoring Framework -- 2.3.1 Risk Decomposition and Tailoring by Balancing -- 2.4 Why Is This Structured Approach so Much More Effective and Efficient -- 3 Choose the Appropriate Verification and Validation Technique -- 4 Conclusion -- Acknowledgement and Disclaimer -- References -- 9 Design of DSS for Supporting Preparedness to and Management of Anomalous Situations in Complex Scenarios -- Abstract -- 1 Introduction -- 2 Design Study -- 3 Database -- 4 Dynamic Data -- 5 Damage Scenario Builder -- 6 Impact Scenario -- 7 RecSIM -- 8 Consequence Analysis -- 9 SAW Indices Estimate.
|
| 505 |
8 |
|
|a 9.1 SAW Indices Estimate for the Citizens Sector -- 9.2 SAW Indices Estimate for the Economic Activities Sector -- 10 Other Operation Modes and Future Work -- 11 Conclusions -- Acknowledgement and Disclaimer -- Appendix 1 -- Appendix 2 -- References -- 10 The Use of What-If Analysis to Improve the Management of Crisis Situations -- Abstract -- 1 Introduction-Role of Critical Infrastructures in Civil Crisis and Disaster Situations -- 2 State of the Art: Critical Review of Literature on What-If Analysis and Federated Modelling and Simulation -- 3 What-If Analysis-A New Capability for Training Crisis Management Staff -- 4 Scenarios for Training -- 5 CIPRTrainer -- 5.1 System Description -- 5.1.1 Design Engine -- 5.1.2 Training Engine -- 5.2 Federated Modelling and Simulation -- 5.2.1 Building CI Simulation Models -- 5.2.2 The Federated Simulation System -- 6 Impact and Consequence Analysis for the Global Assessment of Damages -- 6.1 Goal of the CA -- 6.2 General CA Concept -- 6.3 Geographical Dimension of the Analysis -- 6.4 Determining Impacts -- 6.5 Evaluating Consequences -- 7 Using CIPRTrainer -- 7.1 User Roles -- 7.2 Trainee Module -- 8 Example of a Training Session -- 9 Outlook -- 10 Conclusion -- Acknowledgement and Disclaimer -- References -- 11 Model Coupling with OpenMI Introduction of Basic Concepts -- Abstract -- 1 Introduction -- 2 Model Coupling and Conjunctive Modelling -- 2.1 What Is a Model? -- 2.2 What Is Conjunctive Modelling? -- 2.3 Task -- 3 The OpenMI Standard -- 3.1 Introduction -- 3.2 OpenMI Composition Components -- 3.3 Connections -- 3.4 Making (Legacy) Code OpenMI Compliant -- 3.5 Example Cases of Conjunctive Modelling with OpenMI -- 4 Example: Coupled Flow Simulation and Control -- 4.1 Study Area and Modelling Objective -- 4.2 Approach -- 4.3 The SOBEK Open Channel Flow Model -- 4.4 The RTC-Tools Real-Time Control Model.
|
| 505 |
8 |
|
|a 4.5 Coupling with OpenMI -- 4.6 Coupled Simulation and Simulation Results -- Acknowledgement and Disclaimer -- References.
|
| 588 |
|
|
|a Description based on publisher supplied metadata and other sources.
|
| 590 |
|
|
|a Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2023. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
|
| 655 |
|
4 |
|a Electronic books.
|
| 700 |
1 |
|
|a Rosato, Vittorio.
|
| 700 |
1 |
|
|a Kyriakides, Elias.
|
| 700 |
1 |
|
|a Rome, Erich.
|
| 776 |
0 |
8 |
|i Print version:
|a Setola, Roberto
|t Managing the Complexity of Critical Infrastructures
|d Cham : Springer International Publishing AG,c2017
|z 9783319510422
|
| 797 |
2 |
|
|a ProQuest (Firm)
|
| 830 |
|
0 |
|a Studies in Systems, Decision and Control Series
|
| 856 |
4 |
0 |
|u https://ebookcentral.proquest.com/lib/matrademy/detail.action?docID=6422555
|z Click to View
|