References
- APWA, AMWA, NACWA, & WEF . (2007). Protecting the water sector from security threats: The emerging legal and policy frameworks. Retrieved from https://www.amwa.net/galleries/default-file/SecurityPublicationFinal2.pdf
- BBC News . (2002). Cyanide attack foiled in Italy. Retrieved from http://news.bbc.co.uk/2/hi/europe/1831511.stm
- Carini, M. , Maiolo, M. , Pantusa, D. , Chiaravalloti, F. , & Capano, G. (in press). Modelling and optimization of least-cost water distribution networks with multiple supply sources and users: A Matlab-based approach. Ricerche di Matematica . doi:10.1007/s11587-017-0343-y
- CER . (2005). The EU and counter-terrorism. London: Centre for European Reform. Retrieved October 30, 2017, from http://library.coleurop.be/pdf/CER/keohane.pdf
- Clark, R. M. , & Hakim, S. (2014). Securing water and wastewater systems . Cham: Springer International.10.1007/978-3-319-01092-2
- CNN . (2012). Extremists poison schoolgirls’ water, Afghan officials say . Retrieved from http://edition.cnn.com/2012/04/17/world/afghanistan-girls-poisoned/
- Copeland, C. (2010) Terrorism and security issues facing the water infrastructure sector . Congressional Research Service, 7-5700. Retrieved from https://fas.org/sgp/crs/terror/RL32189.pdf
- Cunha, M. D. C. , & Sousa, J. (1999). Water distribution network design optimization: Simulated annealing approach. Journal of Water Resources Planning and Management , 125 (4), 215–221. doi:10.1061/(ASCE)0733-9496
- Davis, M. J. , & Janke, R. (2011). Patterns in potential impacts associated with contamination events in water distribution systems. Journal of Water Resources Planning and Management , 137 , 1–9. doi:10.1061/(ASCE)WR.1943-5452.0000084
- Davis, M. J. , Janke, R. , & Magnuson, M. (2014). A framework for estimating the adverse health effects of contamination events in water distribution systems and its application. Risk Analysis , 34 , 498–513. doi:10.1111/risa.12107
- Department of Homaland Security, & NIPP . (2013). Partnering for critical infrastructure security and resilience . Retrieved from https://www.dhs.gov/sites/default/files/publications/national-infrastructure-protection-plan-2013-508.pdf
- Department of Homeland Security and US EPA . (2015). Water and wastewater system sector-specific plan, 2015 . Retrieved from https://www.dhs.gov/sites/default/files/publications/nipp-ssp-water-2015-508.pdf
- Di Nardo, A. , Di Natale, M. , Guida, M. , & Musmarra, D. (2013). Water network protection from intentional contamination by sectorization. Water Resources Management , 27 , 1837–1850. doi:10.1007/s11269-012-0133-y
- Di Nardo, A. , Di Natale, M. , Musmarra, D. , Santonastaso, F. G. , Tzatchkov, V. , & Alcocer-Yamanaka, V. H. (2015). Dual-use value of network partitioning for water system management and protection from malicious contamination. Journal of Hydroinformatics , 17 , 361–376. doi:10.2166/hydro.2014.014
- Ezell, B. C. (2007). Infrastructure vulnerability assessment model (I-VAM). Risk Analysis , 27 , 571–583. doi:10.1111/j.1539-6924.2007.00907.x
- Giustolisi, O. , Laucelli, D. , & Colombo, A. F. (2009). Deterministic versus stochastic design of water distribution networks. Journal of Water Resources Planning and Management , 135 : 2, 117–127. doi:10.1061/(ASCE)0733-9496135
- Gleick, P. H. (1993). Water and conflict: Fresh water resources and international security. International Security , 18 , 79–112. doi:10.2307/2539033
- Gleick, P. H. (2006). Water and terrorism. Water Policy , 8 , 481–503. doi:10.2166/wp.2006.035
- Haimes, Y. Y. , & Horowitz, B. M. (2004). Adaptive two-player hierarchical holographic modeling game for counterterrorism intelligence analysis. Journal of Homeland Security and Emergency Management , 1 , 1547–7355. doi:10.2202/1547-7355.1038
- Haimes, Y. Y. , Matalas, N. C. , Lambert, J. H. , & Jackson, B. A. (1998). Vulnerability of water supply systems to attack. Journal of Infrastructure Systems , 4 (4), 164–177. doi:10.1061/(ASCE)1076-0342
- Hickman, D. C. A chemical and biological warfare threat: USAF water systems at risk. The counter proliferation papers future warfare series no. 3. Retrieved from http://www.au.af.mil/au/awc/awcgate/cpc-pubs/hickman.htm
- HSPDs . (2002). Public health security and bioterrorism preparedness and response, act of 2002 (Bioterrorism Act). Retrieved from https://www.gpo.gov/fdsys/pkg/STATUTE-116/pdf/STATUTE-116-Pg594.pdf
- HSPDsHemeltoday News . (2006). Water spiked with weed-killer. Retrieved from http://www.hemeltoday.co.uk/news/water-spiked-with-weed-killer-1-1188459
- Il Giornale . (2017). L’ultima frontiera del terrore: L’Isis userà le armi chimiche. Retrieved from http://www.ilgiornale.it/news/politica/lultima-frontiera-terrore-lisis-user-armi-chimiche-1347316.html
- Ilker, A. , Ahmet, K. , & Ahmet, F. O. (2010). Fuzzy integrated vulnerability assessment model for critical facilities in combating the terrorism. Expert Systems with Applications , 37 , 3561–3573. doi:10.1016/j.eswa.2009.10.035
- Istituto Superiore di Sanità . (2005). Security of water systems ( Reports 05/4 IstiSan). Retrieved from http://www.iss.it/binary/publ/publi/05-4.1118133781.pdf
- Maiolo, M. , & Pantusa, D. (2015). A methodological proposal for the evaluation of potable water use risk. Water Practice & Technology , 10 (1), 152–163. doi:10.2166/wpt.2015.017
- Maiolo, M. , & Pantusa, D. (2016). An optimization procedure for the sustainable management of water resources. Water Science and Technology: Water Supply , 16 (1), 61–69. doi:10.2166/ws.2015.114
- Maiolo, M. , & Pantusa, D. (2017a). A proposal for multiple reuse of urban wastewater. Journal of Water Reuse and Desalination (in press). doi:10.2166/wrd.2017.144
- Maiolo, M. , & Pantusa, D. (2017b). Combined reuse of wastewater and desalination for the management of water systems in conditions of scarcity. Water and Ecology , 72 (4), 116–126. doi:10.23968/2305–3488.2017.22.4.116–126.
- Maiolo, M. , Mendicino, G. , Pantusa, D. , & Senatore, A. (2017). Optimization of drinking water distribution systems in relation to the effects of climate change. Water , 9 (10), 803. doi:10.3390/w9100803
- Murray, R. , Janke, R. , & Jim, U. (eds.). (2004, June–July). The threat ensemble vulnerability assessment (TEVA) program for drinking water distribution system security. Proceedings of the World Water and Environmental Resources Congress 2004 (pp. 482–489). Salt Lake City : ASCE Library.
- NSTAC . (1997). Information assurance task force risk assessment. Retrieved from https://www.dhs.gov/sites/default/files/publications/Information%20Infrastructure%20Group%20Report_1997.pdf
- Nilsson, K. A. , Buchberqer, S. G. , & Clark, R. M. (2005). Simulating exposures to deliberate intrusions into water distribution systems. Journal of Water Resources Planning and Management , 131 (3), 228–236. doi:10.1061/(ASCE)0733-9496
- Panguluri, S. , Phillips, W. , & Cusimano, J. (2011). Protecting water and wastewater infrastructure from cyber attacks. Frontiers of Earth Science , 5 (4), 406–413. doi:10.1007/s11707-011-0199-5
- Saaty, T. L. (1980). The analytic hierarchy process . New York, NY : McGraw-Hill.
- Saaty, T. L. , & Vargas, L. G. , (2012). Models, methods, concepts & applications of the analytic hierarchy process. International series in operations research & management science . New York, NY: Springer Science Business Media.
- Samani, H. M. V. , & Mottaghi, A. (2006). Optimization of water distribution networks using integer linear programming. Journal of Hydraulic Engineering , 132 (5), 501–509. doi:10.1061/(ASCE)0733-9429
- Sun, W. , & Zeng, Z. (2012). City optimal allocation of water resources research based on sustainable development. Advanced Materials Research , 446–449 (1), 2703–2707. doi:10.4028/www.scientific.net/AMR.446-449.2703
- Tgcom24 . (2016). l’Isis vuole avvelenare l’acqua. Retrieved from http://www.tgcom24.mediaset.it/mondo/turchia-secondo-gli-007-di-istanbul-l-isis-vuole-avvelenare-l-acqua-_2155832-201602a.shtml
- The Times of India . (2010). Maoists poison pond close to CRPF camp. Retrieved from http://timesofindia.indiatimes.com/india/Maoists-poison-pond-close-to-CRPF-camp/articleshow/6898493.cms
- The Washington Times . (2003). Al Qaeda warns of threat to water supply. Retrieved from http://www.washingtontimes.com/news/2003/may/28/20030528-102548-4938r/
- Thomas, N. (2006). Risk assessment methods for water infrastructure systems. Kingston: Rhode Island Water Resources Center, University of Rhode Island. Retrieved from http://egr.uri.edu/wp-uploads/wrc/Risk-Assessment-Methods-for-Water-Infrastructure-Systems-2005.pdf
- Tidwell, V. C. , Cooper, J. A. , & Silva, C. J. (2005). Threat assessment of water supply systems using markov latent effects modeling. Journal of Water Resources Planning and Management , 131 (3), 218–227. doi:10.1061/(ASCE)0733-9496
- UPI . (2006). Strychnine found in Danish reservoir. Retrieved from http://www.upi.com/Strychnine-found-in-Danish-reservoir/34481160165538/
- US EPA . (2003). U.S. environmental protection agency response protocol toolbox: Planning for and responding to drinking water contamination threats and incidents. Retrieved from https://www.epa.gov/sites/production/files/2015-06/documents/response_protocol_part_1.pdf
- US EPA . (2007). U.S. environmental protection agency water security initiative: Interim guidance on planning for contamination warning system deployment. EPA 817-R-07-002. Retrieved from https://nepis.epa.gov
- US EPA . (2009). U.S. environmental protection agency national primary drinking water regulations. EPA 816-F-09-004. Retrieved from https://www.nrc.gov/docs/ML1307/ML13078A040.pdf
- US EPA . (2010). U.S. environmental protection agency assessing potential impacts associated with contamination events in water distribution systems: A sensitivity analysis. EPA/600/R-10/061. Retrieved from https://cfpub.epa.gov/si/si_public_record_report.cfm?dirEntryId=224308
- US EPA . (2015). Conduct a drinking water or wastewater utility risk assessment . Office of Water, U.S. Environmental Protection Agency Office of Ground Water, and U.S. EPA Office of Drinking Water. Retrieved from https://www.epa.gov/waterriskassessment
- WSAZ News . (2008). Man accused of threatening water supply . Retrieved from http://www.wsaz.com/news/headlines/31232684.html