[1]
|
J. Sullivant, “Strategies for Protecting National Critical Assets,” Wiley, New York, 2007.
doi:10.1002/9780470228371
|
[2]
|
J. Bullock and D. Haddow, “Introduction to Homeland Security,” New Jersey: Prentice Hall, Upper Saddle River, 2006.
|
[3]
|
M. Amin “Toward Self-Healing Infrastructure Systems,” IEEE Computer Application Power, Vol. 33, No. 8, 2000, pp. 45-53.
|
[4]
|
Y. Haimes, “Risk Modeling, Assessment, and Manage- ment,” John Wiley & Sons, New York, 1998.
|
[5]
|
Y. Haimes and P. Jiang, “Leontief-Based Model of Risk in Complex Interconnected Infrastructures,” Journal of Infrastructure Systems, Vol. 7, No. 1, 2001, pp. 23-27.
doi:10.1061/(ASCE)1076-0342(2001)7:1(1)
|
[6]
|
S. Rosenbush, “Satellites’s Death Puts Millions out of Touch,” USA Today, May 1998. www.ieeexplore.ieee.org
|
[7]
|
D. Verton, “Black Ice: The Invisible Threat of Cyberterrorism,” McGraw Hill, Upper Saddle River, 2003.
|
[8]
|
J. Willenssen, “Critical Infrastructure Protection Signify- cant Challenges in Safeguarding Interdependences,” Oxford University Press, Oxford, 2007.
|