[1] Daniel Ewell Atkins. Revolutionizing Science and Engineering Through Cyberinfrastructure: Report of the National Science Foundation Blue-Ribbon Advisory Panel on Cyberinfrastructure [R/OL]. (2003) [2014-07]. https://arizona.openrepository.com/arizona/bitstream/10150/106224/1/report.pdf. [2] U.S. President’s Commission on Critical Infrastructure Protection. Critical Foundations: Protecting America's Infrastructure [R/OL]. (1997) [2014-07]. http://www.fas.org/sgp/library/pccip.pdf. [3] Clinton W J.Executive order 13010-critical infrastructure protection[J]. Federal Register (S0097-6326), 1996, 61(138): 37347-37350. [4] United States Congress. USA Patriot Act [R/OL]. (2001) [2014-07].http://www.epic.org/privacy/terrorism/hr3162.html. [5] National Institute of Standards and Technology. Framework for improving critical infrastructure cybersecurity [R/OL]. (2014-02) [2014-07]. http://www. nist.gov/cyberframework/upload/cybersecurity-framework-021214-final.pdf. [6] European Commission, Critical Infrastructure Protection in the Fight Against Terrorism, Communication COM (2004) 702 Final, Communication from the Commission to the Council and the European Parliament, Brussels, Belgium, 2004[EB/OL]. (2004-10) [2014-07]. http://eur- lex.europa.eu/legal-content/EN/ALL/?uri=CELEX:52004DC0702. [7] Information Security Policy Council. The Second Action Plan on Information Security Measures for Critical Infrastructures [R/OL]. (2009-02-03) [2014-07-10]. http://www.nisc.go.jp/eng/pdf/actionplan_ci_eng.pdf. [8] Council Directive 2008/114/EC, On the Identification and Designation of European Critical Infrastructures and the Assessment of the Need to Improve their Protection, Official Journal of the European Union, 23 December 2008, L345/75-L345/82. (2009-02-03) [2014-07-10]. Directive 2008/114/EC, On the Identification and Designation of European Critical Infrastructures and the Assessment of the Need to Improve their Protection, Official Journal of the European Union, 23 December 2008, L345/75-L345/82. (2009-02-03) [2014-07-10]. . (2009-02-03) [2014-07-10]. Directive 2008/114/EC, On the Identification and Designation of European Critical Infrastructures and the Assessment of the Need to Improve their Protection, Official Journal of the European Union, 23 December 2008, L345/75-L345/82. (2009-02-03) [2014-07-10]. http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32008L0114. [9] Centre for the Protection of National Infrastructures. Critical National Infrastructure[EB/OL]. [204-07-10]. http://www.cpni.gov.uk/about/cni/. [10] Attorney-General’s Department National Security [EB/OL]. [2014-07-10]. http://www.ag.gov.au/www/ agd/agd.nsf/Page/Nationalsecurity_CriticalInfrastructureProtection. [11] Government of Canada. Critical Infrastructure[EB/OL]. [2014-07-10]. http://publicsafety.gc.ca/prg/em/nciap/ about- en. asp. [12] Aristotle University of Thessaloniki. General Methodology for Systemic Vulnerability Assessment [R/OL]. (2011-04) [2014-07-10]. http://www.vce.at/ SYNER-G/pdf/deliverables/D2.1_General%20methodology%20for%20systemic%20vulnerability%20assessment.pdf. [13] Rinaldi S, J Peerenboom, T Kelly. 2001. Identifying, Understanding, and Analyzing Critical Infrastructure Interdependencies[J]. IEEE Control Systems Magazine (S0272-1708), 2001, 21(6): 11-25. [14] CHERTOFF M.National Infrastructure Protection Plan[M], Washington DC: Department of Homeland Security, 2009. [15] Zimmerman R.Social implications of infrastructure network interactions[J]. Journal of Urban Technology (S1063-0732), 2001, 8(3): 97-119. [16] Wallace W A, Mendonca D M, Lee E E, et al. Managing disruptions to critical interdependent infrastructures in the context of the 2001 World Trade Center attack[M]. USA: Natural Hazards Research and Applications Information Center, University of Colorado, 2003: 165-98. [17] Lee E E, Mitchell J E, Wallace W A.Restoration of services in interdependent infrastructure systems: a network flows approach[J]. IEEE Transactions on systems, Man, and Cybernetics—part C: Application and Reviews (S1094-6977), 2007, 37(6): 1303-1317. [18] Zhang P C, Peeta S.A Generalized Modeling Framework to Analyze Interdependencies Among Infrastructure Systems[J]. Transportation Research, Part B: Methodological (S0191-2615), 2011, 45(3): 553-579. [19] Dudenhoeffer D D, Permann M R, Manic M.CIMS: A Framework for Infrastructure Interdependency Modeling and Analysis[C]// 2006 Winter Simulation Conference. USA: IEEE, 2006: 478-485. [20] Paul Pederson, Danile Dudenhoeffer, Stalin Hartley, et al. Critical infrastructure and interdependency modeling: A survey of US and international research[R]. USA: Idaho National Laboratory, 2006. [21] Leontief W. Input-Output Economics, Second Edition [M]. Oxford, UK: Oxford University Press, 1986. [22] Haimes Y Y, Horowitz B M, Lambert J H, et al. Inoperability input-output model for interdependent infrastructure sectors. I: theory and methodology[J]. Journal of Infrastructure Systems (S1076-0342), 2005, 11(2): 67-79. [23] Haimes Y Y, Horowitz B M, Lambert J H, et al. Inoperability input-output model for interdependent infrastructure sectors. II: case studies[J]. Journal of Infrastructure Systems (S1076-0342), 2005, 11(2): 80-92. [24] Bush B B, Dauelsberg L R, LeClaire R J, et al. Critical Infrastructure Protection Decision Support System (CIP/DSS) Project Overview [R]. Los Alamos, USA: Los Alamos National Laboratory, 2005. [25] Buldyrev S V, Parshani R, Paul G, et al. Catastrophic cascade of failures in interdependent networks[J]. Nature (S0028-0836), 2010, 464(15): 1025-1028. [26] Zio E, Sansavini G.Modeling interdependent network systems for identifying cascade-safe operating margins[J]. IEEE Transactions on Reliability (S0018-9529), 2011, 60(1): 94-101. [27] Gursesli O, Desrochers A A.Modeling Infrastructure Interdependencies Using Petri Nets[C]// IEEE International Conference on Systems, Man and Cybernetics. USA: IEEE, 2003, 2: 1506-1512. [28] Beccuti M, Chiaradonna S, Giandomenico F D, et al. Quantification of dependencies between electrical and information infrastructures[J]. International Journal of Critical Infrastructure Protection (S1874-5482), 2012, 5: 14-27. [29] Rinaldi S M.Modeling and simulating critical infrastructures and their interdependencies[C]// Proceedings of the 37th Hawaii International Conference on System Sciences. USA: IEEE, 2004, 37: 54-61. [30] Sanford Bernhardt K, McNeil S. Agent-based modeling: approach for improving infrastructure management[J]. Journal of Infrastructure Systems(S1076-0342), 2008, 14(3): 253-261. [31] NISAC. NISAC Tools: Overview [EB/OL]. [2014-07-10]. http://www.lanl.gov/programs/nisac/tools2.shtml. [32] Klein R, Rome E, Beyel C, et al. Information Modelling and Simulation in Large Interdependent Critical Infrastructures in IRRIIS[C]// Roberto S, Stefan G. Critical Information Infrastructures Security--Third International Workshop CRITIS 2008. Berlin Heidelberg, Germany: Springer-Verlag, 2009: 36-47. [33] Klein R.Information Modelling and Simulation in Large Dependent Critical Infrastructures-An Overview on the European Integrated Project IRRIIS[C]// Roberto S, Stefan G. Critical Information Infrastructures Security--Third International Workshop CRITIS 2008. Berlin Heidelberg, Germany: Springer-Verlag, 2009. 131-143. |