Article Title,Year,Volume,Issue,Page Range,Author Security assessment of the electricity infrastructure under terrorism,2009,5,3,245-264,Tranchita From complexity science to reliability efficiency: a new way of looking at complex network systems and critical infrastructures,2007,3,3/4,488-508,Zio Mitigation of voltage collapse through active dynamic buffers,2007,3,1/2,101-123,Weaver Review of pedestrian and evacuation simulations,2007,3,3/4,376-388,Still Dynamical models for fault detection in squirrel cage induction motors,2007,3,1/2,161-191,Rodriguez-Cortes Road network unreliability: impact assessment and mitigation,2007,3,3/4,346-375,Nicholson A framework for evaluating risk to the transportation network from terrorism and security policies,2007,3,3/4,389-407,Murray-Tuite Disaster and degradation management: relevance of the concept of flexibility,2007,3,3/4,327-345,Morlok Social impact based contingency screening and ranking,2007,3,1/2,124-141,Zhang Power circuit breaker using micro-mechanical switches,2007,3,1/2,88-100,Karady Intelligent power routers: a distributed coordination approach for electric energy processing networks,2007,3,1/2,20-57,Irizarry-Rivera Intrusion detection through SCADA systems using fuzzy logic-based state estimation methods,2007,3,1/2,58-87,Holbert Controlling cascading failures with cooperative autonomous agents,2007,3,1/2,192-220,Hines The effects of dynamic residential load participation: penetration levels for operational impact on reliability,2007,3,1/2,221-234,Krein Risk and vulnerability games. The anti-satellite weaponry (ASAT),2007,3,3/4,457-470,Gheorghe Critical infrastructures: the need for international risk governance,2007,3,1/2,3-19,Gheorghe An interdisciplinary approach to long-term modelling for power system expansion,2007,3,1/2,235-264,Dimitrovski Competitive egress behaviour: a fuzzy logic-inspired microscopic model,2007,3,3/4,408-429,Dell'Orco Social values and material threat: the European Programme for Critical Infrastructure Protection,2007,3,3/4,471-487,Burgess Requirements for transport network flow models used in reliability analysis,2007,3,3/4,287-300,Asakura An evolving paradigm for managing hazardous materials transportation risk,2007,3,3/4,268-286,Abkowitz Asset maintenance management: state of the art in the European railways,2006,2,2/3,171-186,Zoeteman The next step: quantifying infrastructure interdependencies to improve security,2006,2,2/3,215-230,Restrepo A strategic approach to risk governance of critical infrastructures,2006,2,4,379-395,Masera Modelling infrastructures as socio-technical systems,2006,2,2/3,133-145,Ottens Protection of the Dutch critical infrastructures,2006,2,2/3,201-214,Luiijf Critical infrastructures at risk: securing electric power supply,2006,2,2/3,273-293,Kroger New dilemmas in regulating critical infrastructures,2006,2,2/3,160-170,Heuvelhof Innovative contracting in infrastructure design and maintenance,2006,2,2/3,187-200,Herk Research agenda for an integrated approach to infrastructure planning design and management,2006,2,2/3,146-159,Hansman Another tool in the business of spatial framing of illicit/lost from account radioactive material: helping the AT (Anti-Terrorism) paraphernalia thrive,2006,2,4,347-356,Gheorghe The governance of cybersecurity: a framework for policy,2006,2,4,357-378,van Eeten Emergent information security in critical infrastructures,2006,2,2/3,247-260,Daskapan Distributed intelligence in autonomous multi-vehicle systems,2006,2,2/3,261-272,Lodewijks A case study of critical point identification in the physical and communication layers of a small urban transportation system,2006,2,4,319-330,Butapati Assuring high reliability of service provision in critical infrastructures,2006,2,2/3,231-246,Bruijne Privatisation of seaport infrastructures: a framework for understanding the transfer of property rights,2006,2,2/3,294-317,Bowden Test data for anomaly detection in the electricity infrastructure,2006,2,4,396-411,Bigham Identifying potential repositories for radioactive waste: multiple criteria decision analysis and critical infrastructure systems,2005,1,4,404-422,Bell Framing a new approach to critical infrastructure modelling and extreme events,2005,1,2/3,125-143,Simpson Some insights on issues related to specifics of the use of probability risk uncertainty and logic in PRA studies,2005,1,2/3,281-286,Serbanescu Potential for British research into the transmutation of radioactive wastes and problematic nuclear materials,2005,1,4,380-393,Nuttall Assessing the performance of interdependent infrastructures and optimising investments,2005,1,2/3,144-154,Turnquist Risk analysis of information systems by event process chains,2005,1,2/3,247-257,Mock Transportation data visualisation and mining for emergency management,2005,1,2/3,170-194,Lu Natural disasters and nuclear critical infrastructure negotiations: conflict resolution in Turkey,2005,1,4,367-379,Li Decision support for the management of aging nuclear critical infrastructures: vulnerability assessment and multi-criteria decision analysis,2005,1,4,357-366,Levy Risk management of complex critical systems,2005,1,2/3,195-215,Koubatis Strategic aspects of aging nuclear infrastructure: game theory and the Chernobyl event,2005,1,4,346-356,Levy Using PRTR database for the assessment of surface water risk and improvement of monitoring in Japan,2005,1,2/3,155-169,Hartmann Some lessons learnt from the use of PRA during the design phase,2005,1,2/3,287-292,Serbanescu Reading vulnerability in phase portraits: an exercise in probabilistic resilience assessment,2005,1,4,312-329,Gheorghe On the vulnerability of critical infrastructures: ''seeing it coming'',2005,1,2/3,216-246,Gheorghe The socio-political dimensions of critical information infrastructure protection (CIIP),2005,1,2/3,258-268,Dunn An educational experiment to address infrastructure needs,2005,1,2/3,269-280,Corotis Operator support for ageing nuclear critical infrastructure systems: integrating ecological interface design with prospect theory,2005,1,4,299-311,Asgary Documenting damage disruption interdependencies and the emergency response of power and communication systems after earthquakes,2004,1,1,100-107,Schiff A method for the study of cascading effects within lifeline networks,2004,1,1,86-99,Robert Hidden failures in electric power systems,2004,1,1,64-75,Phadke Risk assessment of catastrophic failures in electric power systems,2004,1,1,38-63,Mili Complexity induced vulnerability,2004,1,1,76-84,Gheorghe Risks vulnerability sustainability and governance: a new landscape for critical infrastructures,2004,1,1,118-124,Gheorghe Prioritising access to scarce resources: network survivability through policy supported quality of service,2004,1,1,20-37,DaSilva Assessing infrastructure interdependencies: the challenge of risk analysis for complex adaptive systems,2004,1,1,108-117,Brown Critical infrastructures will remain vulnerable: neighbourhoods must fend for themselves,2004,1,1,8-19,Balkovich Vulnerability analysis of the physical part of the internet,2010,6,4,402-420,Zhou Structure-preserving dynamical model and distributed stabilisation of electricity infrastructures with renewable energy resources,2010,6,2,131-147,Xie Towards a typology of integrated functional early warning systems,2010,6,1,31-51,Waidyanatha Urban vulnerabilities: think simple,2010,6,3,304-325,Gheorghe Understanding critical infrastructure failure: examining the experience of Biloxi and Gulfport Mississippi after Hurricane Katrina,2010,6,3,246-276,Simpson An approach to identifying geographic interdependencies among critical infrastructures,2010,6,1,17-30,Robert On the development of agent-based models for infrastructure evolution,2010,6,2,148-167,Nikolic Using situational simulations to support decision making in co-dependent infrastructure systems,2010,6,1,52-72,Mukherjee A structured approach to identifying European critical infrastructures,2010,6,3,277-292,Mauro Public perception of the risks of liquefied natural gas terminals in Mexico: a prioritisation of communication strategies,2010,6,4,327-346,Martinez An international tabletop exercise on critical infrastructure protection: the lessons identified,2010,6,3,293-303,Luiijf Critical infrastructures: a review from a complex adaptive systems perspective,2010,6,4,380-401,Nikolic Examining metrics and methods for determining critical facility system effectiveness,2010,6,3,211-224,Hester Evaluation of the consequences of road system failure on other critical infrastructures,2010,6,1,1-16,Robert Modelling and simulation for critical infrastructure interdependency assessment: a meta-review for model characterisation,2010,6,4,363-379,Griot Agent-based modelling of energy infrastructure transitions,2010,6,2,106-130,Chappin Dealing with next generation infrastructures academic programmes complexity induced resiliency assessment,2010,6,4,347-362,Gheorghe Advanced trust negotiations in critical infrastructures,2010,6,3,225-245,Braghin Integrating information security requirements in critical infrastructures: smart metering case,2010,6,2,187-209,AlAbdulkarim A real-life test bed for multi-agent monitoring of road network performance,2009,5,4,357-367,Vrancken Identification of sources of failures and their propagation in critical infrastructures from 12 years of public failure reports,2009,5,3,220-244,Rahman Modelling critical infrastructure via a mixed holistic reductionistic approach,2009,5,1/2,86-99,Porcellinis Tackling challenges in infrastructure operation and control: cross-sectoral learning for process and infrastructure engineers,2009,5,4,308-322,Lukszo Editorial: The operation and evolution of infrastructures: the role of agent-based modelling and decision making,2009,5,4,299-307,Lukszo Modelling the interdependencies of critical infrastructures during natural disasters: a case of supply communication and transportation infrastructures,2009,5,1/2,38-50,Kajitani Reciprocally altruistic agents for the mitigation of cascading failures in power grids,2009,5,4,340-356,Hines Resilience and vulnerability in critical infrastructure systems – a physical analogy,2009,5,4,389-397,Gheorghe Human organisation socio-cognitive vulnerability: the TOGA meta-theory approach to the modelling methodology,2009,5,1/2,120-155,Gadomski High-level modelling of critical infrastructures' interdependencies,2009,5,1/2,100-119,Delamare Agent-based decision support for failure-prone networked infrastructures,2009,5,4,323-339,Dam The evolution of the topology of high-voltage electricity networks,2009,5,1/2,72-85,Helbing Consequences of critical infrastructure interdependencies: lessons from the 2004 hurricane season in Florida,2009,5,3,199-219,Mili Repair strategies for minimising the risk of cascading failures in electricity networks,2009,5,1/2,51-71,Balderer The structure of electrical networks: a graph theory based analysis,2009,5,3,265-284,Atkins Effect of transportation infrastructure network size on its performance during disruptions,2009,5,3,285-298,Aderinlewo Human factors in system reliability: lessons learnt from the Maeslant storm surge barrier in The Netherlands,2008,4,4,418-429,Vrancken Critical issues with 'minor league' nuclear infrastructures: the back end of the life cycle,2008,4,4,368-391,Gheorghe The operational tools for managing physical interdependencies among critical infrastructures,2008,4,4,353-367,Robert Modelling interdependencies among critical infrastructures,2008,4,4,392-408,Robert Extensible threat taxonomy for critical infrastructures,2008,4,4,409-417,Luiijf Forest fire essentials: a cellular automaton-wise percolation-oriented model,2008,4,4,430-444,Gheorghe Rapid restoration of critical infrastructures: An all-hazards paradigm for fusion centres,2011,7,1,21-36,Briere An impact-based approach for the analysis of cascading effects in critical infrastructures,2011,7,1,73-90,Franchina Engineering of societal systems,2011,7,1,4-20,Marsico Comparative analysis of the transportation of select petrochemicals,2013,9,3,226,Stamber Reduction techniques in modelling critical infrastructures under the infrastructure interdependencies simulator framework,2013,9,3,173,Marti Efficient network security as a strategic game,2013,9,3,243,Mili Nineteen national cyber security strategies,2013,9,1/2,3,Luiijf Identifying vulnerabilities in critical infrastructures by network analysis,2013,9,3,190,Lam Enhancing resilience: Implementing resilience building policies against major industrial accidents,2013,9,1/2,130,Hernantes Assessing n-order dependencies between critical infrastructures,2013,9,1/2,93,Kotzanikolaou Using complex event processing for modelling and simulation of cyber-physical systems,2013,9,1/2,148,Klein Systemic determination of infrastructure criticality,2013,9,3,211,Hester Study of the impact of rainfall on freeway traffic flow in Southeast China,2012,8,2/3,230,Liu An insight into bearing strength reporting methods of a runway pavement,2012,8,4,326,Yadav A simple metric for dependencies,2012,8,1,63,Ruzzante Towards enhanced collaboration and information sharing for critical infrastructure resilience: Current barriers and emerging capabilities,2012,8,2/3,107,Trucco Risk-benefit-cost prioritisation of independent protection layers for a liquefied natural gas terminal,2012,8,4,306,Lambert A unified definition for reliability survivability and resilience inspired by the handicap principle and ecological stability,2012,8,2/3,242,Ma Dimensions of resiliency: Essential resiliency exceptional recovery and scale,2012,8,1,47,Laska Linking infrastructure resilience to response requirements: The New Madrid Seismic Zone case,2012,8,1,22,Jefferson Evaluation of state of resilience for a critical infrastructure in a context of interdependencies,2012,8,2/3,95,Robert Terrorism risks civil liberties and privacy concerns,2012,8,4,293,Hausken The case for resilience: A comparative analysis,2012,8,1,3,Harrald Risk management goals and identification of critical infrastructures,2012,8,4,336,Fekete A simple explicit model approximating the relationship between speed and density of vehicular traffic on urban roads,2012,8,2/3,195,Das Regional industries as critical infrastructures: A tale of two modern cities,2012,8,1,74,Calida A framework to analyse extreme events with case studies,2012,8,4,273,Aydin Infrastructure resilience assessment through control design,2011,7,3,243,Vugrin Future trends in road transport systems in Hungary and in the EU,2011,7,2,163,Tanczos The development of a strategic risk analysis framework for interconnected surface transportation systems,2011,7,3,177,Sfetsos Quantitative estimates of critical infrastructures' interdependencies on the communication and information technology infrastructure,2011,7,3,220,Rahman Infrastructure interdependencies simulation through matrix partitioning technique,2011,7,2,91,Rahman Transport and energy consumption in India: The ARDL bound testing approach,2011,7,2,129,Pradhan Lost in translation: overcoming barriers to integrating evidence with practice,2011,7,4,317,Johnston Vulnerability analysis of interdependent critical infrastructures: Case study of the Swedish railway system,2011,7,4,289,Hassel Degree design of coupled infrastructures,2011,7,2,141,Hover Protective measures and vulnerability indices for the Enhanced Critical Infrastructure Protection Programme,2011,7,3,200,Collins Security assessment in complex networks exposed to terrorist hazard: A simulation approach,2008,4,1/2,80,Zio Social network analysis of the vulnerabilities of interdependent critical infrastructures,2008,4,3,256,Liu A disaster response management system based on the control systems technology,2008,4,3,274,Liu The security of power systems and the role of information and communication technologies: Lessons from the recent blackouts,2008,4,1/2,32,Masera Modelling interdependent infrastructures using interacting dynamical models,2008,4,1/2,63,Setola Simulation of heterogeneous and interdependent critical infrastructures,2008,4,1/2,110,Setola Modelling of cascading effects and efficient response to disaster spreading in complex networks,2008,4,1/2,46,Peters Dynamic recovery of critical infrastructures: Real-time temporal coordination,2008,4,1/2,17,Marti Predicting target selection by terrorists: A network analysis of the 2005 London underground attacks,2008,4,1/2,206,Jordan Security trust and QoS in next-generation control and communication for large power systems,2008,4,1/2,3,Hauser The state of the art in critical infrastructure protection: A framework for convergence,2008,4,3,215,Ghorbani Quantitative vulnerability assessment of critical infrastructures: Watching for hidden faults,2008,4,1/2,144,Gheorghe Effects of intentional threats to power substation control systems,2008,4,1/2,129,Masera Analysis of software safety and reliability methods in cyber physical systems,2017,13,1,1-15,Oveisi Critical infrastructure asset identification: seemingly simple but frustratingly elusive,2017,13,1,16-28,White Qualitative criteria in the assessment of security measures for critical infrastructure protection - a new approach,2017,13,1,29-45,Hutter