The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for critical with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1959-1965 (15) 1966-1970 (15) 1971-1974 (27) 1975-1976 (18) 1977-1978 (24) 1979-1980 (40) 1981 (26) 1982 (28) 1983 (24) 1984 (32) 1985 (51) 1986 (43) 1987 (62) 1988 (83) 1989 (95) 1990 (118) 1991 (116) 1992 (181) 1993 (179) 1994 (229) 1995 (313) 1996 (334) 1997 (381) 1998 (458) 1999 (618) 2000 (729) 2001 (823) 2002 (1139) 2003 (1479) 2004 (1828) 2005 (2396) 2006 (2721) 2007 (2980) 2008 (2994) 2009 (1992) 2010 (1028) 2011 (796) 2012 (815) 2013 (826) 2014 (920) 2015 (953) 2016 (882) 2017 (1031) 2018 (1168) 2019 (1201) 2020 (1386) 2021 (1367) 2022 (1453) 2023 (1534) 2024 (324)
Publication types (Num. hits)
article(12908) book(50) data(2) incollection(316) inproceedings(24546) mastersthesis(1) phdthesis(335) proceedings(117)
Venues (Conferences, Journals, ...)
CoRR(1311) HICSS(411) CRITIS(397) FMICS(320) Critical Infrastructure Protec...(303) IEEE Trans. Comput. Aided Des....(252) DAC(247) IEEE Access(231) DATE(202) SSS(196) IPDPS(189) Discret. Math.(165) SAFECOMP(163) WSC(144) IEEE Trans. Very Large Scale I...(143) ICCAD(133) More (+10 of total 5196)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 23864 occurrences of 8654 keywords

Results
Found 38276 publication records. Showing 38275 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
57Phoebe Sengers, Kirsten Boehner, Shay David, Joseph Kaye Reflective design. Search on Bibsonomy Critical Computing The full citation details ... 2005 DBLP  DOI  BibTeX  RDF reflection-in-practice, participatory design, value-sensitive design, critical design, reflective design, critical theory, critical technical practice, ludic design
51Critical Platform Studies Group, Lilly Irani, Niloufar Salehi, Joyojeet Pal, Andrés Monroy-Hernández, Elizabeth F. Churchill, Sneha Narayan Patron or Poison?: Industry Funding of HCI Research. Search on Bibsonomy CSCW Companion The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
49Dan Assaf Government Intervention in Information Infrastructure Protection. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Critical information infrastructure protection, market failures, cyber security, government regulation
45Felix Flentge, Uwe Beyer The ISE Metamodel for Critical Infrastructures. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Infrastructure modeling, ISE metamodel, interdependencies
45Salvatore D'Antonio, Francesco Oliviero, Roberto Setola High-Speed Intrusion Detection in Support of Critical Infrastructure Protection. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF critical infrastructure protection (CIP), critical information infrastructure protection (CIIP), flow monitoring, intrusion detection, security management, SCADA
45Peng-Jun Wan, Chih-Wei Yi Asymptotic critical transmission radius and critical neighbor number for k-connectivity in wireless ad hoc networks. Search on Bibsonomy MobiHoc The full citation details ... 2004 DBLP  DOI  BibTeX  RDF asymptotic distribution, critical neighbor number, critical transmission radius, random geometric graph
44Andy Dearden, Steve Walker, Leon Watts Choosing friends carefully: allies for critical computing. Search on Bibsonomy Critical Computing The full citation details ... 2005 DBLP  DOI  BibTeX  RDF critical computing, social action, HCI
42Tim M. Bull, E. J. Younger, Keith H. Bennett, Z. Luo Bylands: reverse engineering safety-critical systems. Search on Bibsonomy ICSM The full citation details ... 1995 DBLP  DOI  BibTeX  RDF safety-critical software maintenance, Bylands, real-time existing code, high level design extraction, formal transformations, abstract representation, requirements analyses, very-high-level domain languages, real-time systems, reverse engineering, reverse engineering, software maintenance, systems analysis, safety-critical systems, high level languages, safety-critical software, temporal constraints
41Jason K. Kopylec, Anita D'Amico, John R. Goodall Visualizing Cascading Failures in Critical Cyber Infrastructures. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cyber infrastructure, infrastructure dependencies, cascading failures, situational awareness, actor-network theory
40Sang Hyuk Son, Robert C. Beckinger, David A. Baker DRDB: a distributed real-time database server for high-assurance time-critical applications. Search on Bibsonomy COMPSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF DRDB, distributed real time database server, high assurance time critical applications, critical tasks, scheduling decisions, concurrency control mechanisms, functional real time database server, operational platform, distributed real time database issues, distributed databases, timing constraints, data consistency, simulated environment, real time database systems, safety critical applications, operating environment
39Scott Dynes, Eric Goetz, Michael Freeman Cyber Security: Are Economic Incentives Adequate? Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF economic incentives, Information security, government policy
37Michael Carbin, Martin C. Rinard Automatically identifying critical input regions and code in applications. Search on Bibsonomy ISSTA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF critical code, critical input, forgiving code, forgiving input
37Matej Stehlík Minimal Connected tau-Critical Hypergraphs. Search on Bibsonomy Graphs Comb. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ?-critical hypergraphs, Colour-critical graphs, t-stable hypergraphs
37Hamed Okhravi, Adam Comella, Eric Robinson, Stephen Yannalfo, Peter Michaleas, Joshua W. Haines Creating a Cyber Moving Target for Critical Infrastructure Applications. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
37Yujue Wang, Carl Hauser An Evidence-Based Trust Assessment Framework for Critical Infrastructure Decision Making. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
37Dan Assaf Foreign Direct Investment in an Era of Increased Threats to Critical Infrastructures. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Ian Ellefsen, Sebastiaan H. von Solms Critical Information Infrastructure Protection in the Developing World. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Thomas Brandstetter, Konstantin Knorr, Ute Rosenbaum A Manufacturer-Specific Security Assessment Methodology for Critical Infrastructure Components. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Zaw Zaw Aung, Kenji Watanabe A Framework for Modeling Interdependencies in Japan's Critical Infrastructures. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Vincenzo Masucci, Francesco Adinolfi, Paolo Servillo, Giovanni Dipoppa, Alberto Tofani Ontology-Based Critical Infrastructure Modeling and Simulation. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Albert Nieuwenhuijs, Eric A. M. Luiijf, Marieke H. A. Klaver Modeling Dependencies In Critical Infrastructures. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Scott Dynes Emergent Risks In Critical Infrastructures. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37William J. Tolone, Seok-Won Lee, Wei-Ning Xiang, Joshua Blackwell, Cody Yeager, Andrew Schumpert, E. Wray Johnson An Integrated Methodology For Critical Infrastructure Modeling And Simulation. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Amine Baïna, Anas Abou El Kalam, Yves Deswarte, Mohamed Kaâniche Collaborative Access Control For Critical Infrastructures. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Dorsey Wilkin, Richard A. Raines, Paul D. Williams, Kenneth M. Hopkinson Cyberspace Policy For Critical Infrastructures. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Jixing Wang Infinite Family from Each Vertex k-Critical Graph without Any Critical Edge. Search on Bibsonomy COCOA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF De-chromatic, Critical graph, Dirac conjecture, Composition, Decomposition
35Nils Kalstad Svendsen, Stephen D. Wolthusen Multigraph Dependency Models for Heterogeneous Infrastructures. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Infrastructure interdependencies, multigraph models, simulation
35Henrik Christiansson, Eric A. M. Luiijf Creating a European SCADA Security Testbed. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security testbed, risk assessment, SCADA systems
35Robert K. Cunningham, Steven Cheung, Martin W. Fong, Ulf Lindqvist, David M. Nicol, Ronald Pawlowski, Eric Robinson, William H. Sanders, Sankalp Singh, Alfonso Valdes, Bradley Woodworth, Michael Zhivich Securing Current and Future Process Control Systems. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF secure platforms, vulnerability testing, access control, intrusion detection, Process control systems
35Marcelo Masera, Igor Nai Fovino A Service-Oriented Approach for Assessing Infrastructure Security. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF systemof- systems, services, attacks, vulnerabilities, threats, Security assessment
35Marie-Elena C. Kidd Ensuring critical event sequences in high consequence computer based systems as inspired by path expressions. Search on Bibsonomy ECBS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF critical event sequences, unstable operating environments, fault managemen, high consequence software, embedding checkpoints, update points, finite automata, path expressions, computer based systems, hardware failures, critical software
34M. Aater Suleman, Onur Mutlu, Moinuddin K. Qureshi, Yale N. Patt Accelerating critical section execution with asymmetric multi-core architectures. Search on Bibsonomy ASPLOS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF heterogeneous cores, parallel programming, cmp, multi-core, locks, critical sections
34Karthik Pattabiraman, Vinod Grover, Benjamin G. Zorn Samurai: protecting critical data in unsafe languages. Search on Bibsonomy EuroSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF critical memory, error recovery, memory safety
34Shiping Yang, Nan Sang, Guangze Xiong Safety Testing of Safety Critical Software Based on Critical Mission Duration. Search on Bibsonomy PRDC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Safety Testing, Safety Critical System, Bayesian Analysis, Stopping Rules, Reliability Testing
33Peter Dalsgård, Eva Eriksson, Lone Koefoed Hansen Rethinking information handling: designing for information offload. Search on Bibsonomy Critical Computing The full citation details ... 2005 DBLP  DOI  BibTeX  RDF information offload, HCI, interaction design, information overload, critical design
33Joanne M. Atlee, John A. McDermid Integrating requirements analysis and safety analysis. Search on Bibsonomy RE The full citation details ... 1995 DBLP  DOI  BibTeX  RDF system safety requirements, design description, formal specification, systems analysis, requirements analysis, requirements specification, safety critical systems, safety-critical software, safety critical software, functional requirements, safety analysis, high level design
33Wayne D. Gray, Philippe A. Palanque, Fabio Paternò Introduction to the special issue on interface issues and designs for safety-critical interactive systems: when there is no room for user error. Search on Bibsonomy ACM Trans. Comput. Hum. Interact. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
33Akio Doi, Satoshi Suzuki, Koji Koyamada, Shinji Sannakanishi Vortex flow visualization using tetrahedral cell subdivision. Search on Bibsonomy PG The full citation details ... 1997 DBLP  DOI  BibTeX  RDF vortex flow visualization, tetrahedral cell subdivision, critical point searching technique, velocity vector, trilinear interpolation function, hexahedral cell, multiple critical points, linear interpolation function, numerical integration scheme, precise position calculation, Newton's method, vortices
32Jill Slay, Michael Miller Lessons Learned from the Maroochy Water Breach. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SCADA security, Maroochy Water Services breach
32Rodrigo Chandia, Jesús González 0004, Tim Kilpatrick, Mauricio Papa, Sujeet Shenoi Security Strategies for SCADA Networks. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SCADA networks, forensics, security services
32Paul W. Oman, Matthew Phillips Intrusion Detection and Event Monitoring in SCADA Networks. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SCADA networks, Intrusion detection, real-time monitoring
32Jeffrey S. Simonoff, Carlos E. Restrepo, Rae Zimmerman, Zvia Naphtali Analysis of Electrical Power and Oil and Gas Pipeline Failures. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Electrical power, oil and gas pipelines, count regression models, risk
32Janica Edmonds, Mauricio Papa, Sujeet Shenoi Security Analysis of Multilayer SCADA Protocols. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Multilayer protocols, Modbus TCP, formal methods, security analysis
32Mark Blythe, Darren J. Reed, Peter C. Wright, Andrew F. Monk Critical perspectives on dependability: an older person's experience of assistive technology. Search on Bibsonomy Critical Computing The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Eevi E. Beck Learning management systems: the need for critical analyses. Search on Bibsonomy Critical Computing The full citation details ... 2005 DBLP  DOI  BibTeX  RDF educational methods, education, accessibility, control, LMS, learning management systems, standardisation
32Søren Pold The critical interface. Search on Bibsonomy Critical Computing The full citation details ... 2005 DBLP  DOI  BibTeX  RDF interface criticism, HCI, art, aesthetics
32Feruza Sattarova Yusufovna, Farkhod Alisherov Alisherovich, Minkyu Choi, Eun-suk Cho, Furkhat Tadjibayev Abdurashidovich, Tai-Hoon Kim Research on Critical Infrastructures and Critical Information Infrastructures. Search on Bibsonomy BLISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF critical information infrastructure, energy, manufacture, health, icon, finance, law, critical infrastructure, people, problem, food
32Stijn Eyerman, Lieven Eeckhout Modeling critical sections in Amdahl's law and its implications for multicore design. Search on Bibsonomy ISCA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF synchronization, critical sections, analytical performance modeling, Amdahl's law
32Lindsay Grace Critical gameplay. Search on Bibsonomy Advances in Computer Entertainment Technology The full citation details ... 2009 DBLP  DOI  BibTeX  RDF computer game art, critical gameplay, computer game theory
32Thomas Grill, Margit Blauhut Design Patterns Applied in a User Interface Design (UID) Process for Safety Critical Environments (SCEs). Search on Bibsonomy USAB The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Safety critical environments, HCI, patterns
32Tomoyuki Nieda, Alexander A. Pasko, Tosiyasu L. Kunii Detection and Classification of Critical Points for Linear Metamorphosis. Search on Bibsonomy CW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF classification, homotopy, critical points, Morse theory, Metamorphosis
32Richard A. DeMillo, Hsin Pan, Eugene H. Spafford Critical Slicing for Software Fault Localization. Search on Bibsonomy ISSTA The full citation details ... 1996 DBLP  DOI  BibTeX  RDF critical slicing, static program slicing, testing, debugging, failures, faults, fault localization, mutation analysis, dynamic program slicing
31Jonathan White, Brajendra Panda Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Valeria Bonagura, Chiara Foglietta, Stefano Panzieri, Massimiliano Rossi 0005, Riccardo Santini, Monica Scannapieco, Luisa Franchina Modeling and Assessing the Impacts of Cyber Threats on Interdependent Critical Infrastructures. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
30Rajesh Kumar 0012, Siddhant Singh, Rohan Kela Analyzing Advanced Persistent Threats Using Game Theory: A Critical Literature Review. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
30Gemma Galdon Clavell, Victoria Peuvrelle Ethical Issues in Big Data Analytics for Time Critical Mobility Forecasting. Search on Bibsonomy Big Data Analytics for Time-Critical Mobility Forecasting The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
30Rajesh Kumar 0012 A Model-Based Safety-Security Risk Analysis Framework for Interconnected Critical Infrastructures. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
30Tim Ellis, Michael Locasto, David Balenson Cyber State Requirements for Design and Validation of Trust in the Critical Transportation Infrastructure. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
30J. Peter Brady, Sergey Bratus, Sean W. Smith Dynamic Repair of Mission-Critical Applications with Runtime Snap-Ins. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
30Trevor MacLean, Robert Borrelli, Michael Haney Cyber Security Modeling of Non-Critical Nuclear Power Plant Digital Instrumentation. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
30Antonio Di Pietro, Stefano Panzieri, Andrea Gasparri Distributed Data Fusion for Situational Awareness in Critical Infrastructures with Link Failures. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
30Luca Galbusera, Georgios Giannopoulos Exploiting Web Ontologies for Automated Critical Infrastructure Data Retrieval. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
30Alessandro Niglia, Carlos Veraza Building Resilience Through Social Media After an Attack on Critical Infrastructure. Search on Bibsonomy Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
30Francesco Cavallaro, Andrea Chiappetta, Massimiliano De Santis, Anna Pinnarelli Critical Infrastructure Protection: Smart Grids. Search on Bibsonomy Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
30Edoardo Camilli OSINT, Big Data & Critical Infrastructures Protection (CIP). Search on Bibsonomy Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
30Anke Schmidt-Felzmann "Sweden Under Attack!" Lessons from Past Incidents for Coping with a Comprehensive Synchronized Attack on Critical Energy and Information Infrastructure. Search on Bibsonomy Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
30Antonia Colibasanu NATO's Frontier Critical Infrastructure Protection Buildup - Discussion on the Romanian Energy Sector Protection Challenges. Search on Bibsonomy Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
30Gianluca Baldassarre Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges. Search on Bibsonomy Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
30Gianni Cuozzo Critical Infrastructure Cyber-Attack Through Firmware Exploitation. Search on Bibsonomy Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
30George Stergiopoulos, Efstratios Vasilellis, Georgia Lykou, Panayiotis Kotzanikolaou, Dimitris Gritzalis Classification and Comparison of Critical Infrastructure Protection Tools. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
30Michael Quigg, Juan Lopez Jr., Mason Rice, Michael R. Grimaila, Benjamin W. P. Ramsey Cyberspace and Organizational Structure: An Analysis of the Critical Infrastructure Environment. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
30Carol J. Romanowski, Rajendra K. Raj, Jennifer Schneider 0001, Sumita Mishra, Bernard Brooks, Jessica Pardee, Bharat Bhole, Nikolaus Robalino A Multidisciplinary Predictive Model for Managing Critical Infrastructure Disruptions. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
30Bernhard Schneidhofer, Stephen D. Wolthusen Multigraph Critical Infrastructure Model. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
30Christine Izuakor, Richard White Critical Infrastructure Asset Identification: Policy, Methodology and Gap Analysis. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
30Vicenç Puig, Teresa Escobet, Ramon Sarrate, Joseba Quevedo Fault Diagnosis and Fault Tolerant Control in Critical Infrastructure Systems. Search on Bibsonomy Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Georgios Ellinas, Christos G. Panayiotou, Elias Kyriakides, Marios M. Polycarpou Critical Infrastructure Systems: Basic Principles of Monitoring, Control, and Security. Search on Bibsonomy Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Chiara Foglietta, Stefano Panzieri, Federica Pascucci Algorithms and Tools for Risk/Impact Evaluation in Critical Infrastructures. Search on Bibsonomy Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Cesare Alippi, Romolo Camplani, Antonio Marullo, Manuel Roveri Algorithms and Tools for Intelligent Monitoring of Critical Infrastructure Systems. Search on Bibsonomy Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Mietek A. Brdys Algorithms and Tools for Intelligent Control of Critical Infrastructure Systems. Search on Bibsonomy Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Attila Vidács, Rolland Vida Wireless Sensor Network Based Technologies for Critical Infrastructure Systems. Search on Bibsonomy Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Milan Bigovic, Ana Rakocevic Challenges in Defining Critical Infrastructure in Montenegro. Search on Bibsonomy Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Farshad Mohammad-Avvali, Alessandro Niglia Future Activities in Critical Energy Infrastructure Protection - Recommendations. Search on Bibsonomy The Protection of Critical Energy Infrastructure Against Emerging Security Challenges The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Samir Agic, Edin Garaplija Risk Management of Terrorist Attacks in the Tunnels as Critical Points of Corridor 5c Infrastructure - Trans-European Road Network Through Bosnia and Herzegovina. Search on Bibsonomy Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Jaka Vadnjal Corruption: From Generally Accepted Business Practice to Serious Threat to Critical Infrastructure Protection. Search on Bibsonomy Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Riccardo Dugulin The Potential Cooperation Between NATO and Private Risk Management Companies in the Protection of Critical Energy Infrastructure. Search on Bibsonomy The Protection of Critical Energy Infrastructure Against Emerging Security Challenges The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Ferdinand Odzakov, Metodija Dojcinovski Contemporary Aspects in Critical Infrastructure Protection and Combating Terrorism. Search on Bibsonomy Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Milan Tarman Security Vetting in Relation to the Critical Infrastructure. Search on Bibsonomy Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Zoran Kekovic, Vladimir Ninkovic Towards a Resilient Critical Infrastructure System against the Risk of Terrorism. Search on Bibsonomy Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Kutjim Proseku The Critical Energy Infrastructure Protection Against Emerging Security Threats. Search on Bibsonomy The Protection of Critical Energy Infrastructure Against Emerging Security Challenges The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Metodi Hadji-Janev Changing the Approach to Energy Security: Critical Energy Infrastructure Protection in Context. Search on Bibsonomy The Protection of Critical Energy Infrastructure Against Emerging Security Challenges The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Mile Sikman, Nevenko Vranjes Terrorist Threats to Critical Infrastructure in BiH and Protection Measures. Search on Bibsonomy Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Metodi Hadji-Janev Protecting Critical Information Infrastructure from Terrorist Attacks in South East Europe: How Real is the Threat? Search on Bibsonomy Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Mesut Hakki Casin Critical Infrastructure Protection (CIP) and Southern Gas Corridor Policies. Search on Bibsonomy The Protection of Critical Energy Infrastructure Against Emerging Security Challenges The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Sandro Bologna, Alessandro Lazari, Stefano Mele Improving Critical Infrastructure Protection and Resilience against Terrorism Cyber Threats. Search on Bibsonomy Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Stojan Slaveski, Oliver Bakreski Security of Classified Information as Part of the National Critical Infrastructure Protection: Macedonian Experience. Search on Bibsonomy Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Jadran Perinic, Robert Mikac Protection of the Critical Infrastructure from Terrorism: Case Study of the Republic of Croatia. Search on Bibsonomy Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Alessandro Niglia Critical Infrastructure Protection (CEIP) with a Focus on Energy Security. Search on Bibsonomy The Protection of Critical Energy Infrastructure Against Emerging Security Challenges The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Christopher W. Badenhop, Jonathan D. Fuller, Joseph Hall, Benjamin W. P. Ramsey, Mason Rice Evaluating ITU-T G.9959 Based Wireless Systems Used in Critical Infrastructure Assets. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Somya Joshi, Teresa Cerratto Pargman In search of fairness: critical design alternatives for sustainability. Search on Bibsonomy Aarhus Conference on Critical Alternatives The full citation details ... 2015 DBLP  BibTeX  RDF
30Erik Grönvall, Nervo Verdezoto, Naveen Bagalkot, Tomas Sokoler Concordance: a critical participatory alternative in healthcare IT. Search on Bibsonomy Aarhus Conference on Critical Alternatives The full citation details ... 2015 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 38275 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license