Simulation modeling, 1:579

Simulation models, 1:575

Simulations, in transportation infrastructure, 2:1261

Simulations and contrived tasks method, 3:1542

Simulation techniques, in handling infrastructure interdependence, 2:1165, 1166

Simulation testing, in financial infrastructure, 2:1265

Simulation tools, 1:573

Simulator for Electric Power Industry Agents (SEPIA), 2:1266

Singapore

CIIP law and legislation in, 2:851852

critical information infrastructure protection in, 2:846853

early CIIP warning in, 2:850851

public-private CIIP partnerships in, 2:850

Singapore Computer Emergency Response Team (SingCERT), 2:850851

Singapore Police Force (SPF), 2:850

Single-decision problem, 3:1524

Single-enterprise-wide scope of protection, in access control, 2:973

Single factor analysis of variance (ANOVA), 3:1759, 1760

Single-hazard detectors, 3:1847

Single level components, in multilevel security, 2:1036

Single nucleotide polymorphisms (SNPs), analysis of, 3:2012

“Single-point failure” locations, 1:198

Single sign on, in access control, 2:973

Single system research, on interdependent infrastructure system disruptions, 2:1420

Single textured geometry, 1:476

Site and systems security effectiveness, 1:141, 142

Site assessments, in risk methodology study, 2:12101211

SiteKey system, phishing and, 2:1114

Site tours, in vulnerability assessment, 1:148

Site vulnerability assessment, 1:622

Situational analysis of threats and hazards, AG KRITIS initiatives for, 2:724

Situational awareness, advanced ...

Get Wiley Handbook of Science and Technology for Homeland Security, 4 Volume Set now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.