Managing the Complexity of Critical Infrastructures : : A Modelling and Simulation Approach.

Saved in:
Bibliographic Details
Superior document:Studies in Systems, Decision and Control Series ; v.90
:
TeilnehmendeR:
Place / Publishing House:Cham : : Springer International Publishing AG,, 2017.
©2016.
Year of Publication:2017
Edition:1st ed.
Language:English
Series:Studies in Systems, Decision and Control Series
Online Access:
Physical Description:1 online resource (300 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 5006422555
ctrlnum (MiAaPQ)5006422555
(Au-PeEL)EBL6422555
(OCoLC)1076236359
collection bib_alma
record_format marc
spelling Setola, Roberto.
Managing the Complexity of Critical Infrastructures : A Modelling and Simulation Approach.
1st ed.
Cham : Springer International Publishing AG, 2017.
©2016.
1 online resource (300 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Studies in Systems, Decision and Control Series ; v.90
Intro -- Preface -- Contents -- 1 Critical Infrastructures, Protection and Resilience -- Abstract -- 1 Introduction -- 2 Importance of Protection and Resilience -- 3 Government Initiatives: Policies and Research -- 3.1 The US Approach -- 3.2 Initiatives in Europe -- 3.3 The Australian Approach -- 4 CI Resilience -- 5 Conclusion -- Acknowledgement and Disclaimer -- References -- 2 Modelling Dependencies Between Critical Infrastructures -- Abstract -- 1 Introduction -- 2 Why Are Dependencies Important? -- 3 Dependencies and Interdependencies -- 4 Dependency Modeling Approaches -- 5 Holistic Approaches -- 6 Networked Based Approaches -- 7 Conclusions -- Acknowledgement and Disclaimer -- References -- 3 Critical Infrastructure Disruption Scenarios Analyses via Simulation -- Abstract -- 1 Introduction -- 2 Scenarios Simulation -- 2.1 Types of Models -- 2.2 Scenarios' Basic Elements -- 2.3 Identification and Specification of Threats and Consequences -- 2.4 Modelling and Simulation of Threats and Consequences -- 2.5 Modelling and Simulation of CIs' Cascade of Disruptions -- 2.5.1 Vulnerability -- 2.5.2 CI Dependency -- 2.5.3 Integrating Vulnerability and Dependency -- 2.6 Cascading of Disruptions -- 2.7 The Story Time-Line -- 3 A Hypothetical Crisis Scenario -- 3.1 Crisis Scenario Description -- 3.2 Identification and Specification of the Threat -- 3.3 Identification and Specification of the CIs and Their Vulnerability -- 3.4 Specification of the CIs Dependency -- 3.5 Definition of the Cascade of Disruptions -- 3.6 Definition of the Crisis Management Target -- 3.7 The Consequence to Mitigate or to Dump -- 3.8 Scenario Assessment: Simulation and Analysis -- 3.8.1 Whey the Unstressed Case? -- 3.8.2 Unstressed Case -- 3.8.3 Stressed Case -- 4 Conclusions -- Acknowledgement and Disclaimer -- References -- 4 Physical Simulators of Critical Infrastructures.
Abstract -- 1 Introduction -- 2 Power Systems -- 2.1 DIgSILENT PowerFactory -- 2.2 SIEMENS PSS® E -- 2.3 SIEMENS PSS® SINCAL -- 2.4 SIEMENS PSS® NETOMAC -- 2.5 MATLAB® Simulink® -- 2.6 PowerWorld Simulator -- 2.7 PSCAD™ EMTDC™ -- 2.8 EMTP-RV -- 3 Telecommunication Networks -- 3.1 ns-2 -- 3.2 Other Simulators -- 4 Water Networks and Urban Drainage -- 4.1 Design Phase -- 4.2 Construction and Commissioning Phase -- 4.3 Operation and Maintenance (O&amp -- M) Phase -- 5 Transportation Systems -- 6 Conclusions -- Acknowledgement and Disclaimer -- References -- 5 Phenomenological Simulators of Critical Infrastructures -- Abstract -- 1 Introduction -- 2 Phenomenological Approaches -- 2.1 Leontief I/O Models -- 2.1.1 ENEA Extended Leontief Models -- 2.2 System Dynamics -- 2.3 i2SIM -- 3 Topological Analysis -- 4 A CI MA&amp -- S Platform for Complex and Large Scenarios -- 5 Conclusion -- Acknowledgement and Disclaimer -- References -- 6 Federated Simulations -- Abstract -- 1 Introduction -- 2 Distributed Simulation -- 2.1 Introduction -- 2.2 Levels of Interoperability -- 2.3 Approach for Coupling Simulation Models -- 3 Overview of the High Level Architecture -- 3.1 Introduction -- 3.2 Framework and Rules -- 3.3 Interface Specification -- 3.4 Object Model Template Specification -- 3.5 HLA RTI Implementations -- 4 Distributed Simulation Environment Development -- 5 Federation Agreements Template -- 6 Summary -- Acknowledgement and Disclaimer -- References -- 7 Cyber Threats Impacting Critical Infrastructures -- Abstract -- 1 Introduction -- 2 Goals and Challenges -- 2.1 Cyber World and Real Impact-Selected Case Studies -- 2.2 The Coordinated Cyber Attack-Ukrainian Case -- 2.3 Hybrid Conflicts -- 3 Cyber Threats Taxonomies -- 4 CIP Cyber-Physical Security Life-Cycle Models -- 4.1 Pre-crisis Phase -- 4.1.1 Prevention and Proactive Response.
4.1.2 Threat Detection -- 4.2 Crisis Phase -- 4.3 Post-crisis Phase -- 5 Modelling Cyber Security Aspects -- 5.1 Network Modelling -- 5.2 Cyber Risk Assessment -- 5.3 System Behaviour and Attacks Modelling -- 6 Ongoing Efforts -- 6.1 H2020 Work Program View on CPS Aspects -- 6.2 Security Standards for Critical Infrastructures -- 7 Conclusions -- Acknowledgement and Disclaimer -- References -- 8 Verification and Validation for CIPRNet -- Abstract -- 1 Do V&amp -- V If There Is Risk Involved -- 1.1 Modelling and Simulation -- 1.2 Verification and Validation -- 1.3 But How to Do V&amp -- V, and How Much? -- 2 Do V&amp -- V in a Structured Way to Be More Effective and Efficient -- 2.1 Conceptual Framework -- 2.1.1 Links to Systems Engineering -- 2.1.2 M&amp -- S-Based Problem Solving Approach -- 2.1.3 V&amp -- V Problem Solving Approach -- 2.1.4 Acceptance Recommendation, Acceptability Criteria and Evidential Quality -- 2.1.5 V&amp -- V Argumentation Approach: Structured Reasoning with Arguments -- 2.1.6 V&amp -- V Organizational and Management Approach -- 2.1.7 V&amp -- V Levels of Independence: Acceptance, Certification and Accreditation -- 2.1.8 V&amp -- V Information and Knowledge Management -- 2.2 Implementation Framework -- 2.3 Tailoring Framework -- 2.3.1 Risk Decomposition and Tailoring by Balancing -- 2.4 Why Is This Structured Approach so Much More Effective and Efficient -- 3 Choose the Appropriate Verification and Validation Technique -- 4 Conclusion -- Acknowledgement and Disclaimer -- References -- 9 Design of DSS for Supporting Preparedness to and Management of Anomalous Situations in Complex Scenarios -- Abstract -- 1 Introduction -- 2 Design Study -- 3 Database -- 4 Dynamic Data -- 5 Damage Scenario Builder -- 6 Impact Scenario -- 7 RecSIM -- 8 Consequence Analysis -- 9 SAW Indices Estimate.
9.1 SAW Indices Estimate for the Citizens Sector -- 9.2 SAW Indices Estimate for the Economic Activities Sector -- 10 Other Operation Modes and Future Work -- 11 Conclusions -- Acknowledgement and Disclaimer -- Appendix 1 -- Appendix 2 -- References -- 10 The Use of What-If Analysis to Improve the Management of Crisis Situations -- Abstract -- 1 Introduction-Role of Critical Infrastructures in Civil Crisis and Disaster Situations -- 2 State of the Art: Critical Review of Literature on What-If Analysis and Federated Modelling and Simulation -- 3 What-If Analysis-A New Capability for Training Crisis Management Staff -- 4 Scenarios for Training -- 5 CIPRTrainer -- 5.1 System Description -- 5.1.1 Design Engine -- 5.1.2 Training Engine -- 5.2 Federated Modelling and Simulation -- 5.2.1 Building CI Simulation Models -- 5.2.2 The Federated Simulation System -- 6 Impact and Consequence Analysis for the Global Assessment of Damages -- 6.1 Goal of the CA -- 6.2 General CA Concept -- 6.3 Geographical Dimension of the Analysis -- 6.4 Determining Impacts -- 6.5 Evaluating Consequences -- 7 Using CIPRTrainer -- 7.1 User Roles -- 7.2 Trainee Module -- 8 Example of a Training Session -- 9 Outlook -- 10 Conclusion -- Acknowledgement and Disclaimer -- References -- 11 Model Coupling with OpenMI Introduction of Basic Concepts -- Abstract -- 1 Introduction -- 2 Model Coupling and Conjunctive Modelling -- 2.1 What Is a Model? -- 2.2 What Is Conjunctive Modelling? -- 2.3 Task -- 3 The OpenMI Standard -- 3.1 Introduction -- 3.2 OpenMI Composition Components -- 3.3 Connections -- 3.4 Making (Legacy) Code OpenMI Compliant -- 3.5 Example Cases of Conjunctive Modelling with OpenMI -- 4 Example: Coupled Flow Simulation and Control -- 4.1 Study Area and Modelling Objective -- 4.2 Approach -- 4.3 The SOBEK Open Channel Flow Model -- 4.4 The RTC-Tools Real-Time Control Model.
4.5 Coupling with OpenMI -- 4.6 Coupled Simulation and Simulation Results -- Acknowledgement and Disclaimer -- References.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic books.
Rosato, Vittorio.
Kyriakides, Elias.
Rome, Erich.
Print version: Setola, Roberto Managing the Complexity of Critical Infrastructures Cham : Springer International Publishing AG,c2017 9783319510422
ProQuest (Firm)
Studies in Systems, Decision and Control Series
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6422555 Click to View
language English
format eBook
author Setola, Roberto.
spellingShingle Setola, Roberto.
Managing the Complexity of Critical Infrastructures : A Modelling and Simulation Approach.
Studies in Systems, Decision and Control Series ;
Intro -- Preface -- Contents -- 1 Critical Infrastructures, Protection and Resilience -- Abstract -- 1 Introduction -- 2 Importance of Protection and Resilience -- 3 Government Initiatives: Policies and Research -- 3.1 The US Approach -- 3.2 Initiatives in Europe -- 3.3 The Australian Approach -- 4 CI Resilience -- 5 Conclusion -- Acknowledgement and Disclaimer -- References -- 2 Modelling Dependencies Between Critical Infrastructures -- Abstract -- 1 Introduction -- 2 Why Are Dependencies Important? -- 3 Dependencies and Interdependencies -- 4 Dependency Modeling Approaches -- 5 Holistic Approaches -- 6 Networked Based Approaches -- 7 Conclusions -- Acknowledgement and Disclaimer -- References -- 3 Critical Infrastructure Disruption Scenarios Analyses via Simulation -- Abstract -- 1 Introduction -- 2 Scenarios Simulation -- 2.1 Types of Models -- 2.2 Scenarios' Basic Elements -- 2.3 Identification and Specification of Threats and Consequences -- 2.4 Modelling and Simulation of Threats and Consequences -- 2.5 Modelling and Simulation of CIs' Cascade of Disruptions -- 2.5.1 Vulnerability -- 2.5.2 CI Dependency -- 2.5.3 Integrating Vulnerability and Dependency -- 2.6 Cascading of Disruptions -- 2.7 The Story Time-Line -- 3 A Hypothetical Crisis Scenario -- 3.1 Crisis Scenario Description -- 3.2 Identification and Specification of the Threat -- 3.3 Identification and Specification of the CIs and Their Vulnerability -- 3.4 Specification of the CIs Dependency -- 3.5 Definition of the Cascade of Disruptions -- 3.6 Definition of the Crisis Management Target -- 3.7 The Consequence to Mitigate or to Dump -- 3.8 Scenario Assessment: Simulation and Analysis -- 3.8.1 Whey the Unstressed Case? -- 3.8.2 Unstressed Case -- 3.8.3 Stressed Case -- 4 Conclusions -- Acknowledgement and Disclaimer -- References -- 4 Physical Simulators of Critical Infrastructures.
Abstract -- 1 Introduction -- 2 Power Systems -- 2.1 DIgSILENT PowerFactory -- 2.2 SIEMENS PSS® E -- 2.3 SIEMENS PSS® SINCAL -- 2.4 SIEMENS PSS® NETOMAC -- 2.5 MATLAB® Simulink® -- 2.6 PowerWorld Simulator -- 2.7 PSCAD™ EMTDC™ -- 2.8 EMTP-RV -- 3 Telecommunication Networks -- 3.1 ns-2 -- 3.2 Other Simulators -- 4 Water Networks and Urban Drainage -- 4.1 Design Phase -- 4.2 Construction and Commissioning Phase -- 4.3 Operation and Maintenance (O&amp -- M) Phase -- 5 Transportation Systems -- 6 Conclusions -- Acknowledgement and Disclaimer -- References -- 5 Phenomenological Simulators of Critical Infrastructures -- Abstract -- 1 Introduction -- 2 Phenomenological Approaches -- 2.1 Leontief I/O Models -- 2.1.1 ENEA Extended Leontief Models -- 2.2 System Dynamics -- 2.3 i2SIM -- 3 Topological Analysis -- 4 A CI MA&amp -- S Platform for Complex and Large Scenarios -- 5 Conclusion -- Acknowledgement and Disclaimer -- References -- 6 Federated Simulations -- Abstract -- 1 Introduction -- 2 Distributed Simulation -- 2.1 Introduction -- 2.2 Levels of Interoperability -- 2.3 Approach for Coupling Simulation Models -- 3 Overview of the High Level Architecture -- 3.1 Introduction -- 3.2 Framework and Rules -- 3.3 Interface Specification -- 3.4 Object Model Template Specification -- 3.5 HLA RTI Implementations -- 4 Distributed Simulation Environment Development -- 5 Federation Agreements Template -- 6 Summary -- Acknowledgement and Disclaimer -- References -- 7 Cyber Threats Impacting Critical Infrastructures -- Abstract -- 1 Introduction -- 2 Goals and Challenges -- 2.1 Cyber World and Real Impact-Selected Case Studies -- 2.2 The Coordinated Cyber Attack-Ukrainian Case -- 2.3 Hybrid Conflicts -- 3 Cyber Threats Taxonomies -- 4 CIP Cyber-Physical Security Life-Cycle Models -- 4.1 Pre-crisis Phase -- 4.1.1 Prevention and Proactive Response.
4.1.2 Threat Detection -- 4.2 Crisis Phase -- 4.3 Post-crisis Phase -- 5 Modelling Cyber Security Aspects -- 5.1 Network Modelling -- 5.2 Cyber Risk Assessment -- 5.3 System Behaviour and Attacks Modelling -- 6 Ongoing Efforts -- 6.1 H2020 Work Program View on CPS Aspects -- 6.2 Security Standards for Critical Infrastructures -- 7 Conclusions -- Acknowledgement and Disclaimer -- References -- 8 Verification and Validation for CIPRNet -- Abstract -- 1 Do V&amp -- V If There Is Risk Involved -- 1.1 Modelling and Simulation -- 1.2 Verification and Validation -- 1.3 But How to Do V&amp -- V, and How Much? -- 2 Do V&amp -- V in a Structured Way to Be More Effective and Efficient -- 2.1 Conceptual Framework -- 2.1.1 Links to Systems Engineering -- 2.1.2 M&amp -- S-Based Problem Solving Approach -- 2.1.3 V&amp -- V Problem Solving Approach -- 2.1.4 Acceptance Recommendation, Acceptability Criteria and Evidential Quality -- 2.1.5 V&amp -- V Argumentation Approach: Structured Reasoning with Arguments -- 2.1.6 V&amp -- V Organizational and Management Approach -- 2.1.7 V&amp -- V Levels of Independence: Acceptance, Certification and Accreditation -- 2.1.8 V&amp -- V Information and Knowledge Management -- 2.2 Implementation Framework -- 2.3 Tailoring Framework -- 2.3.1 Risk Decomposition and Tailoring by Balancing -- 2.4 Why Is This Structured Approach so Much More Effective and Efficient -- 3 Choose the Appropriate Verification and Validation Technique -- 4 Conclusion -- Acknowledgement and Disclaimer -- References -- 9 Design of DSS for Supporting Preparedness to and Management of Anomalous Situations in Complex Scenarios -- Abstract -- 1 Introduction -- 2 Design Study -- 3 Database -- 4 Dynamic Data -- 5 Damage Scenario Builder -- 6 Impact Scenario -- 7 RecSIM -- 8 Consequence Analysis -- 9 SAW Indices Estimate.
9.1 SAW Indices Estimate for the Citizens Sector -- 9.2 SAW Indices Estimate for the Economic Activities Sector -- 10 Other Operation Modes and Future Work -- 11 Conclusions -- Acknowledgement and Disclaimer -- Appendix 1 -- Appendix 2 -- References -- 10 The Use of What-If Analysis to Improve the Management of Crisis Situations -- Abstract -- 1 Introduction-Role of Critical Infrastructures in Civil Crisis and Disaster Situations -- 2 State of the Art: Critical Review of Literature on What-If Analysis and Federated Modelling and Simulation -- 3 What-If Analysis-A New Capability for Training Crisis Management Staff -- 4 Scenarios for Training -- 5 CIPRTrainer -- 5.1 System Description -- 5.1.1 Design Engine -- 5.1.2 Training Engine -- 5.2 Federated Modelling and Simulation -- 5.2.1 Building CI Simulation Models -- 5.2.2 The Federated Simulation System -- 6 Impact and Consequence Analysis for the Global Assessment of Damages -- 6.1 Goal of the CA -- 6.2 General CA Concept -- 6.3 Geographical Dimension of the Analysis -- 6.4 Determining Impacts -- 6.5 Evaluating Consequences -- 7 Using CIPRTrainer -- 7.1 User Roles -- 7.2 Trainee Module -- 8 Example of a Training Session -- 9 Outlook -- 10 Conclusion -- Acknowledgement and Disclaimer -- References -- 11 Model Coupling with OpenMI Introduction of Basic Concepts -- Abstract -- 1 Introduction -- 2 Model Coupling and Conjunctive Modelling -- 2.1 What Is a Model? -- 2.2 What Is Conjunctive Modelling? -- 2.3 Task -- 3 The OpenMI Standard -- 3.1 Introduction -- 3.2 OpenMI Composition Components -- 3.3 Connections -- 3.4 Making (Legacy) Code OpenMI Compliant -- 3.5 Example Cases of Conjunctive Modelling with OpenMI -- 4 Example: Coupled Flow Simulation and Control -- 4.1 Study Area and Modelling Objective -- 4.2 Approach -- 4.3 The SOBEK Open Channel Flow Model -- 4.4 The RTC-Tools Real-Time Control Model.
4.5 Coupling with OpenMI -- 4.6 Coupled Simulation and Simulation Results -- Acknowledgement and Disclaimer -- References.
author_facet Setola, Roberto.
Rosato, Vittorio.
Kyriakides, Elias.
Rome, Erich.
author_variant r s rs
author2 Rosato, Vittorio.
Kyriakides, Elias.
Rome, Erich.
author2_variant v r vr
e k ek
e r er
author2_role TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
author_sort Setola, Roberto.
title Managing the Complexity of Critical Infrastructures : A Modelling and Simulation Approach.
title_sub A Modelling and Simulation Approach.
title_full Managing the Complexity of Critical Infrastructures : A Modelling and Simulation Approach.
title_fullStr Managing the Complexity of Critical Infrastructures : A Modelling and Simulation Approach.
title_full_unstemmed Managing the Complexity of Critical Infrastructures : A Modelling and Simulation Approach.
title_auth Managing the Complexity of Critical Infrastructures : A Modelling and Simulation Approach.
title_new Managing the Complexity of Critical Infrastructures :
title_sort managing the complexity of critical infrastructures : a modelling and simulation approach.
series Studies in Systems, Decision and Control Series ;
series2 Studies in Systems, Decision and Control Series ;
publisher Springer International Publishing AG,
publishDate 2017
physical 1 online resource (300 pages)
edition 1st ed.
contents Intro -- Preface -- Contents -- 1 Critical Infrastructures, Protection and Resilience -- Abstract -- 1 Introduction -- 2 Importance of Protection and Resilience -- 3 Government Initiatives: Policies and Research -- 3.1 The US Approach -- 3.2 Initiatives in Europe -- 3.3 The Australian Approach -- 4 CI Resilience -- 5 Conclusion -- Acknowledgement and Disclaimer -- References -- 2 Modelling Dependencies Between Critical Infrastructures -- Abstract -- 1 Introduction -- 2 Why Are Dependencies Important? -- 3 Dependencies and Interdependencies -- 4 Dependency Modeling Approaches -- 5 Holistic Approaches -- 6 Networked Based Approaches -- 7 Conclusions -- Acknowledgement and Disclaimer -- References -- 3 Critical Infrastructure Disruption Scenarios Analyses via Simulation -- Abstract -- 1 Introduction -- 2 Scenarios Simulation -- 2.1 Types of Models -- 2.2 Scenarios' Basic Elements -- 2.3 Identification and Specification of Threats and Consequences -- 2.4 Modelling and Simulation of Threats and Consequences -- 2.5 Modelling and Simulation of CIs' Cascade of Disruptions -- 2.5.1 Vulnerability -- 2.5.2 CI Dependency -- 2.5.3 Integrating Vulnerability and Dependency -- 2.6 Cascading of Disruptions -- 2.7 The Story Time-Line -- 3 A Hypothetical Crisis Scenario -- 3.1 Crisis Scenario Description -- 3.2 Identification and Specification of the Threat -- 3.3 Identification and Specification of the CIs and Their Vulnerability -- 3.4 Specification of the CIs Dependency -- 3.5 Definition of the Cascade of Disruptions -- 3.6 Definition of the Crisis Management Target -- 3.7 The Consequence to Mitigate or to Dump -- 3.8 Scenario Assessment: Simulation and Analysis -- 3.8.1 Whey the Unstressed Case? -- 3.8.2 Unstressed Case -- 3.8.3 Stressed Case -- 4 Conclusions -- Acknowledgement and Disclaimer -- References -- 4 Physical Simulators of Critical Infrastructures.
Abstract -- 1 Introduction -- 2 Power Systems -- 2.1 DIgSILENT PowerFactory -- 2.2 SIEMENS PSS® E -- 2.3 SIEMENS PSS® SINCAL -- 2.4 SIEMENS PSS® NETOMAC -- 2.5 MATLAB® Simulink® -- 2.6 PowerWorld Simulator -- 2.7 PSCAD™ EMTDC™ -- 2.8 EMTP-RV -- 3 Telecommunication Networks -- 3.1 ns-2 -- 3.2 Other Simulators -- 4 Water Networks and Urban Drainage -- 4.1 Design Phase -- 4.2 Construction and Commissioning Phase -- 4.3 Operation and Maintenance (O&amp -- M) Phase -- 5 Transportation Systems -- 6 Conclusions -- Acknowledgement and Disclaimer -- References -- 5 Phenomenological Simulators of Critical Infrastructures -- Abstract -- 1 Introduction -- 2 Phenomenological Approaches -- 2.1 Leontief I/O Models -- 2.1.1 ENEA Extended Leontief Models -- 2.2 System Dynamics -- 2.3 i2SIM -- 3 Topological Analysis -- 4 A CI MA&amp -- S Platform for Complex and Large Scenarios -- 5 Conclusion -- Acknowledgement and Disclaimer -- References -- 6 Federated Simulations -- Abstract -- 1 Introduction -- 2 Distributed Simulation -- 2.1 Introduction -- 2.2 Levels of Interoperability -- 2.3 Approach for Coupling Simulation Models -- 3 Overview of the High Level Architecture -- 3.1 Introduction -- 3.2 Framework and Rules -- 3.3 Interface Specification -- 3.4 Object Model Template Specification -- 3.5 HLA RTI Implementations -- 4 Distributed Simulation Environment Development -- 5 Federation Agreements Template -- 6 Summary -- Acknowledgement and Disclaimer -- References -- 7 Cyber Threats Impacting Critical Infrastructures -- Abstract -- 1 Introduction -- 2 Goals and Challenges -- 2.1 Cyber World and Real Impact-Selected Case Studies -- 2.2 The Coordinated Cyber Attack-Ukrainian Case -- 2.3 Hybrid Conflicts -- 3 Cyber Threats Taxonomies -- 4 CIP Cyber-Physical Security Life-Cycle Models -- 4.1 Pre-crisis Phase -- 4.1.1 Prevention and Proactive Response.
4.1.2 Threat Detection -- 4.2 Crisis Phase -- 4.3 Post-crisis Phase -- 5 Modelling Cyber Security Aspects -- 5.1 Network Modelling -- 5.2 Cyber Risk Assessment -- 5.3 System Behaviour and Attacks Modelling -- 6 Ongoing Efforts -- 6.1 H2020 Work Program View on CPS Aspects -- 6.2 Security Standards for Critical Infrastructures -- 7 Conclusions -- Acknowledgement and Disclaimer -- References -- 8 Verification and Validation for CIPRNet -- Abstract -- 1 Do V&amp -- V If There Is Risk Involved -- 1.1 Modelling and Simulation -- 1.2 Verification and Validation -- 1.3 But How to Do V&amp -- V, and How Much? -- 2 Do V&amp -- V in a Structured Way to Be More Effective and Efficient -- 2.1 Conceptual Framework -- 2.1.1 Links to Systems Engineering -- 2.1.2 M&amp -- S-Based Problem Solving Approach -- 2.1.3 V&amp -- V Problem Solving Approach -- 2.1.4 Acceptance Recommendation, Acceptability Criteria and Evidential Quality -- 2.1.5 V&amp -- V Argumentation Approach: Structured Reasoning with Arguments -- 2.1.6 V&amp -- V Organizational and Management Approach -- 2.1.7 V&amp -- V Levels of Independence: Acceptance, Certification and Accreditation -- 2.1.8 V&amp -- V Information and Knowledge Management -- 2.2 Implementation Framework -- 2.3 Tailoring Framework -- 2.3.1 Risk Decomposition and Tailoring by Balancing -- 2.4 Why Is This Structured Approach so Much More Effective and Efficient -- 3 Choose the Appropriate Verification and Validation Technique -- 4 Conclusion -- Acknowledgement and Disclaimer -- References -- 9 Design of DSS for Supporting Preparedness to and Management of Anomalous Situations in Complex Scenarios -- Abstract -- 1 Introduction -- 2 Design Study -- 3 Database -- 4 Dynamic Data -- 5 Damage Scenario Builder -- 6 Impact Scenario -- 7 RecSIM -- 8 Consequence Analysis -- 9 SAW Indices Estimate.
9.1 SAW Indices Estimate for the Citizens Sector -- 9.2 SAW Indices Estimate for the Economic Activities Sector -- 10 Other Operation Modes and Future Work -- 11 Conclusions -- Acknowledgement and Disclaimer -- Appendix 1 -- Appendix 2 -- References -- 10 The Use of What-If Analysis to Improve the Management of Crisis Situations -- Abstract -- 1 Introduction-Role of Critical Infrastructures in Civil Crisis and Disaster Situations -- 2 State of the Art: Critical Review of Literature on What-If Analysis and Federated Modelling and Simulation -- 3 What-If Analysis-A New Capability for Training Crisis Management Staff -- 4 Scenarios for Training -- 5 CIPRTrainer -- 5.1 System Description -- 5.1.1 Design Engine -- 5.1.2 Training Engine -- 5.2 Federated Modelling and Simulation -- 5.2.1 Building CI Simulation Models -- 5.2.2 The Federated Simulation System -- 6 Impact and Consequence Analysis for the Global Assessment of Damages -- 6.1 Goal of the CA -- 6.2 General CA Concept -- 6.3 Geographical Dimension of the Analysis -- 6.4 Determining Impacts -- 6.5 Evaluating Consequences -- 7 Using CIPRTrainer -- 7.1 User Roles -- 7.2 Trainee Module -- 8 Example of a Training Session -- 9 Outlook -- 10 Conclusion -- Acknowledgement and Disclaimer -- References -- 11 Model Coupling with OpenMI Introduction of Basic Concepts -- Abstract -- 1 Introduction -- 2 Model Coupling and Conjunctive Modelling -- 2.1 What Is a Model? -- 2.2 What Is Conjunctive Modelling? -- 2.3 Task -- 3 The OpenMI Standard -- 3.1 Introduction -- 3.2 OpenMI Composition Components -- 3.3 Connections -- 3.4 Making (Legacy) Code OpenMI Compliant -- 3.5 Example Cases of Conjunctive Modelling with OpenMI -- 4 Example: Coupled Flow Simulation and Control -- 4.1 Study Area and Modelling Objective -- 4.2 Approach -- 4.3 The SOBEK Open Channel Flow Model -- 4.4 The RTC-Tools Real-Time Control Model.
4.5 Coupling with OpenMI -- 4.6 Coupled Simulation and Simulation Results -- Acknowledgement and Disclaimer -- References.
isbn 9783319510439
9783319510422
callnumber-first T - Technology
callnumber-subject TA - General and Civil Engineering
callnumber-label TA352-356
callnumber-sort TA 3352 3356
genre Electronic books.
genre_facet Electronic books.
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6422555
illustrated Not Illustrated
oclc_num 1076236359
work_keys_str_mv AT setolaroberto managingthecomplexityofcriticalinfrastructuresamodellingandsimulationapproach
AT rosatovittorio managingthecomplexityofcriticalinfrastructuresamodellingandsimulationapproach
AT kyriakideselias managingthecomplexityofcriticalinfrastructuresamodellingandsimulationapproach
AT romeerich managingthecomplexityofcriticalinfrastructuresamodellingandsimulationapproach
status_str n
ids_txt_mv (MiAaPQ)5006422555
(Au-PeEL)EBL6422555
(OCoLC)1076236359
carrierType_str_mv cr
hierarchy_parent_title Studies in Systems, Decision and Control Series ; v.90
is_hierarchy_title Managing the Complexity of Critical Infrastructures : A Modelling and Simulation Approach.
container_title Studies in Systems, Decision and Control Series ; v.90
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
marc_error Info : MARC8 translation shorter than ISO-8859-1, choosing MARC8. --- [ 856 : z ]
_version_ 1792331057856512000
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>09414nam a22004813i 4500</leader><controlfield tag="001">5006422555</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20240229073837.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">240229s2017 xx o ||||0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319510439</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9783319510422</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5006422555</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL6422555</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1076236359</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TA352-356</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Setola, Roberto.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Managing the Complexity of Critical Infrastructures :</subfield><subfield code="b">A Modelling and Simulation Approach.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham :</subfield><subfield code="b">Springer International Publishing AG,</subfield><subfield code="c">2017.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2016.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (300 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Studies in Systems, Decision and Control Series ;</subfield><subfield code="v">v.90</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Intro -- Preface -- Contents -- 1 Critical Infrastructures, Protection and Resilience -- Abstract -- 1 Introduction -- 2 Importance of Protection and Resilience -- 3 Government Initiatives: Policies and Research -- 3.1 The US Approach -- 3.2 Initiatives in Europe -- 3.3 The Australian Approach -- 4 CI Resilience -- 5 Conclusion -- Acknowledgement and Disclaimer -- References -- 2 Modelling Dependencies Between Critical Infrastructures -- Abstract -- 1 Introduction -- 2 Why Are Dependencies Important? -- 3 Dependencies and Interdependencies -- 4 Dependency Modeling Approaches -- 5 Holistic Approaches -- 6 Networked Based Approaches -- 7 Conclusions -- Acknowledgement and Disclaimer -- References -- 3 Critical Infrastructure Disruption Scenarios Analyses via Simulation -- Abstract -- 1 Introduction -- 2 Scenarios Simulation -- 2.1 Types of Models -- 2.2 Scenarios' Basic Elements -- 2.3 Identification and Specification of Threats and Consequences -- 2.4 Modelling and Simulation of Threats and Consequences -- 2.5 Modelling and Simulation of CIs' Cascade of Disruptions -- 2.5.1 Vulnerability -- 2.5.2 CI Dependency -- 2.5.3 Integrating Vulnerability and Dependency -- 2.6 Cascading of Disruptions -- 2.7 The Story Time-Line -- 3 A Hypothetical Crisis Scenario -- 3.1 Crisis Scenario Description -- 3.2 Identification and Specification of the Threat -- 3.3 Identification and Specification of the CIs and Their Vulnerability -- 3.4 Specification of the CIs Dependency -- 3.5 Definition of the Cascade of Disruptions -- 3.6 Definition of the Crisis Management Target -- 3.7 The Consequence to Mitigate or to Dump -- 3.8 Scenario Assessment: Simulation and Analysis -- 3.8.1 Whey the Unstressed Case? -- 3.8.2 Unstressed Case -- 3.8.3 Stressed Case -- 4 Conclusions -- Acknowledgement and Disclaimer -- References -- 4 Physical Simulators of Critical Infrastructures.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Abstract -- 1 Introduction -- 2 Power Systems -- 2.1 DIgSILENT PowerFactory -- 2.2 SIEMENS PSS® E -- 2.3 SIEMENS PSS® SINCAL -- 2.4 SIEMENS PSS® NETOMAC -- 2.5 MATLAB® Simulink® -- 2.6 PowerWorld Simulator -- 2.7 PSCAD™ EMTDC™ -- 2.8 EMTP-RV -- 3 Telecommunication Networks -- 3.1 ns-2 -- 3.2 Other Simulators -- 4 Water Networks and Urban Drainage -- 4.1 Design Phase -- 4.2 Construction and Commissioning Phase -- 4.3 Operation and Maintenance (O&amp;amp -- M) Phase -- 5 Transportation Systems -- 6 Conclusions -- Acknowledgement and Disclaimer -- References -- 5 Phenomenological Simulators of Critical Infrastructures -- Abstract -- 1 Introduction -- 2 Phenomenological Approaches -- 2.1 Leontief I/O Models -- 2.1.1 ENEA Extended Leontief Models -- 2.2 System Dynamics -- 2.3 i2SIM -- 3 Topological Analysis -- 4 A CI MA&amp;amp -- S Platform for Complex and Large Scenarios -- 5 Conclusion -- Acknowledgement and Disclaimer -- References -- 6 Federated Simulations -- Abstract -- 1 Introduction -- 2 Distributed Simulation -- 2.1 Introduction -- 2.2 Levels of Interoperability -- 2.3 Approach for Coupling Simulation Models -- 3 Overview of the High Level Architecture -- 3.1 Introduction -- 3.2 Framework and Rules -- 3.3 Interface Specification -- 3.4 Object Model Template Specification -- 3.5 HLA RTI Implementations -- 4 Distributed Simulation Environment Development -- 5 Federation Agreements Template -- 6 Summary -- Acknowledgement and Disclaimer -- References -- 7 Cyber Threats Impacting Critical Infrastructures -- Abstract -- 1 Introduction -- 2 Goals and Challenges -- 2.1 Cyber World and Real Impact-Selected Case Studies -- 2.2 The Coordinated Cyber Attack-Ukrainian Case -- 2.3 Hybrid Conflicts -- 3 Cyber Threats Taxonomies -- 4 CIP Cyber-Physical Security Life-Cycle Models -- 4.1 Pre-crisis Phase -- 4.1.1 Prevention and Proactive Response.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4.1.2 Threat Detection -- 4.2 Crisis Phase -- 4.3 Post-crisis Phase -- 5 Modelling Cyber Security Aspects -- 5.1 Network Modelling -- 5.2 Cyber Risk Assessment -- 5.3 System Behaviour and Attacks Modelling -- 6 Ongoing Efforts -- 6.1 H2020 Work Program View on CPS Aspects -- 6.2 Security Standards for Critical Infrastructures -- 7 Conclusions -- Acknowledgement and Disclaimer -- References -- 8 Verification and Validation for CIPRNet -- Abstract -- 1 Do V&amp;amp -- V If There Is Risk Involved -- 1.1 Modelling and Simulation -- 1.2 Verification and Validation -- 1.3 But How to Do V&amp;amp -- V, and How Much? -- 2 Do V&amp;amp -- V in a Structured Way to Be More Effective and Efficient -- 2.1 Conceptual Framework -- 2.1.1 Links to Systems Engineering -- 2.1.2 M&amp;amp -- S-Based Problem Solving Approach -- 2.1.3 V&amp;amp -- V Problem Solving Approach -- 2.1.4 Acceptance Recommendation, Acceptability Criteria and Evidential Quality -- 2.1.5 V&amp;amp -- V Argumentation Approach: Structured Reasoning with Arguments -- 2.1.6 V&amp;amp -- V Organizational and Management Approach -- 2.1.7 V&amp;amp -- V Levels of Independence: Acceptance, Certification and Accreditation -- 2.1.8 V&amp;amp -- V Information and Knowledge Management -- 2.2 Implementation Framework -- 2.3 Tailoring Framework -- 2.3.1 Risk Decomposition and Tailoring by Balancing -- 2.4 Why Is This Structured Approach so Much More Effective and Efficient -- 3 Choose the Appropriate Verification and Validation Technique -- 4 Conclusion -- Acknowledgement and Disclaimer -- References -- 9 Design of DSS for Supporting Preparedness to and Management of Anomalous Situations in Complex Scenarios -- Abstract -- 1 Introduction -- 2 Design Study -- 3 Database -- 4 Dynamic Data -- 5 Damage Scenario Builder -- 6 Impact Scenario -- 7 RecSIM -- 8 Consequence Analysis -- 9 SAW Indices Estimate.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">9.1 SAW Indices Estimate for the Citizens Sector -- 9.2 SAW Indices Estimate for the Economic Activities Sector -- 10 Other Operation Modes and Future Work -- 11 Conclusions -- Acknowledgement and Disclaimer -- Appendix 1 -- Appendix 2 -- References -- 10 The Use of What-If Analysis to Improve the Management of Crisis Situations -- Abstract -- 1 Introduction-Role of Critical Infrastructures in Civil Crisis and Disaster Situations -- 2 State of the Art: Critical Review of Literature on What-If Analysis and Federated Modelling and Simulation -- 3 What-If Analysis-A New Capability for Training Crisis Management Staff -- 4 Scenarios for Training -- 5 CIPRTrainer -- 5.1 System Description -- 5.1.1 Design Engine -- 5.1.2 Training Engine -- 5.2 Federated Modelling and Simulation -- 5.2.1 Building CI Simulation Models -- 5.2.2 The Federated Simulation System -- 6 Impact and Consequence Analysis for the Global Assessment of Damages -- 6.1 Goal of the CA -- 6.2 General CA Concept -- 6.3 Geographical Dimension of the Analysis -- 6.4 Determining Impacts -- 6.5 Evaluating Consequences -- 7 Using CIPRTrainer -- 7.1 User Roles -- 7.2 Trainee Module -- 8 Example of a Training Session -- 9 Outlook -- 10 Conclusion -- Acknowledgement and Disclaimer -- References -- 11 Model Coupling with OpenMI Introduction of Basic Concepts -- Abstract -- 1 Introduction -- 2 Model Coupling and Conjunctive Modelling -- 2.1 What Is a Model? -- 2.2 What Is Conjunctive Modelling? -- 2.3 Task -- 3 The OpenMI Standard -- 3.1 Introduction -- 3.2 OpenMI Composition Components -- 3.3 Connections -- 3.4 Making (Legacy) Code OpenMI Compliant -- 3.5 Example Cases of Conjunctive Modelling with OpenMI -- 4 Example: Coupled Flow Simulation and Control -- 4.1 Study Area and Modelling Objective -- 4.2 Approach -- 4.3 The SOBEK Open Channel Flow Model -- 4.4 The RTC-Tools Real-Time Control Model.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4.5 Coupling with OpenMI -- 4.6 Coupled Simulation and Simulation Results -- Acknowledgement and Disclaimer -- References.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. </subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rosato, Vittorio.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kyriakides, Elias.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rome, Erich.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Setola, Roberto</subfield><subfield code="t">Managing the Complexity of Critical Infrastructures</subfield><subfield code="d">Cham : Springer International Publishing AG,c2017</subfield><subfield code="z">9783319510422</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Studies in Systems, Decision and Control Series</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6422555</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>