The capability/vulnerability paradox and military revolutions: Implications for computing, cyber, and the onset of war

J Schneider - Emerging Technologies and International Stability, 2021 - taylorfrancis.com
The Information Revolution, or the rise in computing power, allowed states to leverage
digital capabilities to exert conventional military dominance. But does it also create …

Cyber-attacks on the Oil & Gas sector: A survey on incident assessment and attack patterns

G Stergiopoulos, DA Gritzalis, E Limnaios - Ieee Access, 2020 - ieeexplore.ieee.org
During the past two decades, oil and gas operational and information technology systems
have experienced constant digital growth, closely followed by an increasing number of cyber …

[HTML][HTML] Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures

G Stergiopoulos, P Kotzanikolaou… - International Journal of …, 2016 - Elsevier
Dependency analysis of critical infrastructures is a computationally intensive problem when
dealing with large-scale, cross-sectoral, cascading and common-cause failures. The …

[HTML][HTML] Risk mitigation strategies for critical infrastructures based on graph centrality analysis

G Stergiopoulos, P Kotzanikolaou… - International Journal of …, 2015 - Elsevier
Dependency risk graphs have been proposed as a tool for analyzing cascading failures due
to critical infrastructure dependency chains. However, dependency chain analysis is not by …

Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0

G Stergiopoulos, P Dedousis, D Gritzalis - International Journal of …, 2022 - Springer
Threat models and attack graphs have been used more than 20 years by enterprises and
organizations for mapping the actions of potential adversaries, analyzing the effects of …

[PDF][PDF] Restraint under conditions of uncertainty: Why the United States tolerates cyberattacks

M Kaminska - Journal of Cybersecurity, 2021 - academic.oup.com
Abstract The United States struggles to impose meaningful costs for destructive or disruptive
cyber operations. This article argues that the United States' restrained responses stem from …

Access control issues in utilizing fog computing for transport infrastructure

S Salonikias, I Mavridis, D Gritzalis - … 2015, Berlin, Germany, October 5-7 …, 2016 - Springer
The integration of the information and communication technologies of cloud computing,
Software Defined Networking (SDN) and Internet of Things (IoT) into traditional …

Challenges and issues in risk assessment in modern maritime systems

S Papastergiou, EM Kalogeraki, N Polemi… - Advances in Core …, 2021 - Springer
In this paper, we present challenges and risks concerning cyber security in a supply chain
environment. In particular, we focus on the MITIGATE (Multidimensional, IntegraTed, rIsk …

Cascading effects of common-cause failures in critical infrastructures

P Kotzanikolaou, M Theoharidou, D Gritzalis - … Infrastructure Protection VII …, 2013 - Springer
One of the most challenging problems in critical infrastructure protection is the assessment
and mitigation of cascading failures across infrastructures. In previous research, we have …

[PDF][PDF] Challenges in security engineering of systems-of-systems

V Chiprianov, L Gallon, M Munier, P Aniorte… - … en IngénieriE du …, 2014 - Citeseer
Abstract Systems of systems (SoS) are large-scale systems composed of complex systems
with difficult to predict emergent properties. One of the most significant challenges in the …