Critical Infrastructure Security


Assessment, Prevention, Detection, Response

a book edited by Francesco Flammini

and published by Wit Press

This book provides a comprehensive survey of state-of-the-art techniques for the security of critical infrastructures, addressing both logical and physical aspects from an engineering point of view. Recently developed methodologies and tools for CI analysis as well as strategies and technologies for CI protection are investigated in the following strongly interrelated and multidisciplinary main fields:

  • Vulnerability analysis and risk assessment
  • Threat prevention, detection and response
  • Emergency planning and management

Each of the aforementioned topics is addressed considering both theoretical aspects and practical applications. Emphasis is given to model-based holistic evaluation approaches as well as to emerging protection technologies, including smart surveillance through networks of intelligent sensing devices. Critical Infrastructure Security can be used as a self-contained reference handbook for both practitioners and researchers or even as a textbook for master/doctoral degree students in engineering or related disciplines.

More specifically, the topic coverage of the book includes:

•      Historical background on threats to critical infrastructures

•      Model-based risk evaluation and management approaches

•      Security surveys and game-theoretic vulnerability assessment

•      Federated simulation for interdependency analysis

•      Security operator training and emergency preparedness

•      Intelligent multimedia (audio-video) surveillance

•      Terahertz body scanners for weapon and explosive detection

•      Security system design (intrusion detection / access control)

•      Dependability and resilience of computer networks (SCADA / cyber-security)

•      Wireless smart-sensor networks and structural health monitoring

•      Information systems for crisis response and emergency management

•      Early warning, situation awareness and decision support software

The list of contributors include:

Ted G. Lewis, Rudolph P. Darken, Thomas Mackin, Donald Dudenhoeffer, Roger G. Johnston, Gabriele Oliva, Stefano Panzieri, Roberto Setola, Stephen Elky, A. Bondavalli, P. Lollini, L. Montecchi, Stefan Winter, Daniel Germanus, Hamza Ghani, Thorsten Piper, Abdelmajid Khelil, Neeraj Suri, Vincenzo Masucci, William B. Samuels, Farhad Dolatshahi, James R. Villanueva, Christopher J. Ziemniak, V. M. Bier, S. Tas, Brian Hennessey, F. Garzia, Rita Cucchiara, Andrea Prati, Roberto Vezzani, Stavros Ntalampiras, Megan R. Leahy-Hoppa, R. Mason, L. Gintert, S. Sweeney, K. Chandler, J. Chandler, P. Langendoerfer, L. Buttyan, A. Hessler, C. Casteluccia, A. Casaca, A. Alkassar, E. Osipov, Neil C. Rowe, Ahren A. Reed, Riqui Schwamm, Jeehee Cho, Jose J. Flores, Arijit Das, Luigi Coppolino, Salvatore D’Antonio, Luigi Romano, D. L. Hall


Book page on WIT Press (TOC preview available) – individual chapters

Buy on Amazon

Book announcement on ERCIM News

Discount order form


The following discount scale applies if resultant orders are routed to David Anderson (

1 – 20 copies   20%
21 – 40 copies 30%
41 – 60 copies 40%

> 60 copies 50%

Excerpts from the CIS Book Review by Michael Greenberg (*) on the Wiley journal Risk Analysis (Vol. 32, No. 8, 2012):

[…] Critical Infrastructure Security provides “the most up to date compendium of critical infrastructure” literature.

The contributors are government, private, and university experts from Europe and North America; several are Society for Risk Analysis (SRA) members.

[…] the book contains five parts and 19 chapters. “Fundamentals of Security Risk and Vulnerability Assessment” are addressed in Part I, which contains chapters about models and vulnerability assessment. Part II offers four chapters about modeling and simulation tools, including game theory and graphical simulation tools. Part III focuses on cyber security and supervisory control and data acquisition (SCADA) systems, and Part IV has five chapters about monitoring and surveillance technologies. The last four chapters, Part V, are about integrating security systems and using alarms.”

“The book is a handy reference, especially for cyber security, sensors, and several other subareas. Some of the chapters are particularly well done. My favorites were vulnerability assessment, game theory, information technology risks, intelligent video surveillance, terahertz for weapon, and explosive detection.”

If I was teaching a course about critical infrastructure […], I would then pick from among the following books, each of which has a focus on a specific area, such as cyber security, structures, and so on. Critical Infrastructure Security fits into this last set of books, with the clear advantage of presenting recent advancements […]”

(*) Dr. Michael Greenberg, Professor and Director of the National Center for Neighborhood and Brownfields Redevelopment of Rutgers University; Director of the National Center for Transportation Security Excellence, and Associate Dean of the Faculty of the Bloustein School of Planning and Public Policy, Rutgers University, New Jersey (USA). Dr. Greenberg studies urban environmental, health and neighborhood redevelopment policies.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s