|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 23864 occurrences of 8654 keywords
|
|
|
Results
Found 38276 publication records. Showing 38275 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
57 | Phoebe Sengers, Kirsten Boehner, Shay David, Joseph Kaye |
Reflective design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Computing ![In: Proceedings of the 4th Decennial Conference on Critical Computing: Between Sense and Sensibility, 2005, Aarhus, Denmark, August 20-24, 2005, pp. 49-58, 2005, ACM, 1-59593-203-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
reflection-in-practice, participatory design, value-sensitive design, critical design, reflective design, critical theory, critical technical practice, ludic design |
51 | Critical Platform Studies Group, Lilly Irani, Niloufar Salehi, Joyojeet Pal, Andrés Monroy-Hernández, Elizabeth F. Churchill, Sneha Narayan |
Patron or Poison?: Industry Funding of HCI Research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCW Companion ![In: Companion Publication of the 2019 ACM Conference on Computer Supported Cooperative Work and Social Computing, CSCW 2019, Austin, TX, USA, November 09-13, 2019, pp. 111-115, 2019, ACM, 978-1-4503-6692-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
49 | Dan Assaf |
Government Intervention in Information Infrastructure Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007, pp. 29-39, 2007, Springer, 978-0-387-75461-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Critical information infrastructure protection, market failures, cyber security, government regulation |
45 | Felix Flentge, Uwe Beyer |
The ISE Metamodel for Critical Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007, pp. 323-336, 2007, Springer, 978-0-387-75461-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Infrastructure modeling, ISE metamodel, interdependencies |
45 | Salvatore D'Antonio, Francesco Oliviero, Roberto Setola |
High-Speed Intrusion Detection in Support of Critical Infrastructure Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRITIS ![In: Critical Information Infrastructures Security, First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006, Revised Papers, pp. 222-234, 2006, Springer, 3-540-69083-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
critical infrastructure protection (CIP), critical information infrastructure protection (CIIP), flow monitoring, intrusion detection, security management, SCADA |
45 | Peng-Jun Wan, Chih-Wei Yi |
Asymptotic critical transmission radius and critical neighbor number for k-connectivity in wireless ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiHoc ![In: Proceedings of the 5th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2004, Roppongi Hills, Tokyo, Japan, May 24-26, 2004, pp. 1-8, 2004, ACM, 1-58113-849-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
asymptotic distribution, critical neighbor number, critical transmission radius, random geometric graph |
44 | Andy Dearden, Steve Walker, Leon Watts |
Choosing friends carefully: allies for critical computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Computing ![In: Proceedings of the 4th Decennial Conference on Critical Computing: Between Sense and Sensibility, 2005, Aarhus, Denmark, August 20-24, 2005, pp. 133-136, 2005, ACM, 1-59593-203-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
critical computing, social action, HCI |
42 | Tim M. Bull, E. J. Younger, Keith H. Bennett, Z. Luo |
Bylands: reverse engineering safety-critical systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: Proceedings of the International Conference on Software Maintenance, ICSM 1995, Opio (Nice), France, October 17-20, 1995, pp. 358-366, 1995, IEEE Computer Society, 0-8186-7141-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
safety-critical software maintenance, Bylands, real-time existing code, high level design extraction, formal transformations, abstract representation, requirements analyses, very-high-level domain languages, real-time systems, reverse engineering, reverse engineering, software maintenance, systems analysis, safety-critical systems, high level languages, safety-critical software, temporal constraints |
41 | Jason K. Kopylec, Anita D'Amico, John R. Goodall |
Visualizing Cascading Failures in Critical Cyber Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007, pp. 351-364, 2007, Springer, 978-0-387-75461-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Cyber infrastructure, infrastructure dependencies, cascading failures, situational awareness, actor-network theory |
40 | Sang Hyuk Son, Robert C. Beckinger, David A. Baker |
DRDB: a distributed real-time database server for high-assurance time-critical applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 21st International Computer Software and Applications Conference (COMPSAC '97), 11-15 August 1997, Washington, DC, USA, pp. 362-367, 1997, IEEE Computer Society, 0-8186-8105-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
DRDB, distributed real time database server, high assurance time critical applications, critical tasks, scheduling decisions, concurrency control mechanisms, functional real time database server, operational platform, distributed real time database issues, distributed databases, timing constraints, data consistency, simulated environment, real time database systems, safety critical applications, operating environment |
39 | Scott Dynes, Eric Goetz, Michael Freeman |
Cyber Security: Are Economic Incentives Adequate? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007, pp. 15-27, 2007, Springer, 978-0-387-75461-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
economic incentives, Information security, government policy |
37 | Michael Carbin, Martin C. Rinard |
Automatically identifying critical input regions and code in applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSTA ![In: Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, ISSTA 2010, Trento, Italy, July 12-16, 2010, pp. 37-48, 2010, ACM, 978-1-60558-823-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
critical code, critical input, forgiving code, forgiving input |
37 | Matej Stehlík |
Minimal Connected tau-Critical Hypergraphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Graphs Comb. ![In: Graphs Comb. 22(3), pp. 421-426, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
?-critical hypergraphs, Colour-critical graphs, t-stable hypergraphs |
37 | Hamed Okhravi, Adam Comella, Eric Robinson, Stephen Yannalfo, Peter Michaleas, Joshua W. Haines |
Creating a Cyber Moving Target for Critical Infrastructure Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection V - 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Hanover, NH, USA, March 23-25, 2011, Revised Selected Papers, pp. 107-123, 2011, Springer, 978-3-642-24863-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
37 | Yujue Wang, Carl Hauser |
An Evidence-Based Trust Assessment Framework for Critical Infrastructure Decision Making. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection V - 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Hanover, NH, USA, March 23-25, 2011, Revised Selected Papers, pp. 125-135, 2011, Springer, 978-3-642-24863-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
37 | Dan Assaf |
Foreign Direct Investment in an Era of Increased Threats to Critical Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection IV - Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers, pp. 17-27, 2010, Springer, 978-3-642-16805-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
37 | Ian Ellefsen, Sebastiaan H. von Solms |
Critical Information Infrastructure Protection in the Developing World. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection IV - Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers, pp. 29-40, 2010, Springer, 978-3-642-16805-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
37 | Thomas Brandstetter, Konstantin Knorr, Ute Rosenbaum |
A Manufacturer-Specific Security Assessment Methodology for Critical Infrastructure Components. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection IV - Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers, pp. 229-244, 2010, Springer, 978-3-642-16805-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
37 | Zaw Zaw Aung, Kenji Watanabe |
A Framework for Modeling Interdependencies in Japan's Critical Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection III - Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers, pp. 243-257, 2009, Springer, 978-3-642-04797-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Vincenzo Masucci, Francesco Adinolfi, Paolo Servillo, Giovanni Dipoppa, Alberto Tofani |
Ontology-Based Critical Infrastructure Modeling and Simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection III - Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers, pp. 229-242, 2009, Springer, 978-3-642-04797-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Albert Nieuwenhuijs, Eric A. M. Luiijf, Marieke H. A. Klaver |
Modeling Dependencies In Critical Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection II - Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers, pp. 205-213, 2008, Springer, 978-0-387-88522-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Scott Dynes |
Emergent Risks In Critical Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection II - Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers, pp. 3-16, 2008, Springer, 978-0-387-88522-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
37 | William J. Tolone, Seok-Won Lee, Wei-Ning Xiang, Joshua Blackwell, Cody Yeager, Andrew Schumpert, E. Wray Johnson |
An Integrated Methodology For Critical Infrastructure Modeling And Simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection II - Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers, pp. 257-268, 2008, Springer, 978-0-387-88522-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Amine Baïna, Anas Abou El Kalam, Yves Deswarte, Mohamed Kaâniche |
Collaborative Access Control For Critical Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection II - Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers, pp. 189-201, 2008, Springer, 978-0-387-88522-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Dorsey Wilkin, Richard A. Raines, Paul D. Williams, Kenneth M. Hopkinson |
Cyberspace Policy For Critical Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection II - Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers, pp. 17-28, 2008, Springer, 978-0-387-88522-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Jixing Wang |
Infinite Family from Each Vertex k-Critical Graph without Any Critical Edge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COCOA ![In: Combinatorial Optimization and Applications, Third International Conference, COCOA 2009, Huangshan, China, June 10-12, 2009. Proceedings, pp. 238-248, 2009, Springer, 978-3-642-02025-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
De-chromatic, Critical graph, Dirac conjecture, Composition, Decomposition |
35 | Nils Kalstad Svendsen, Stephen D. Wolthusen |
Multigraph Dependency Models for Heterogeneous Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007, pp. 337-350, 2007, Springer, 978-0-387-75461-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Infrastructure interdependencies, multigraph models, simulation |
35 | Henrik Christiansson, Eric A. M. Luiijf |
Creating a European SCADA Security Testbed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007, pp. 237-247, 2007, Springer, 978-0-387-75461-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security testbed, risk assessment, SCADA systems |
35 | Robert K. Cunningham, Steven Cheung, Martin W. Fong, Ulf Lindqvist, David M. Nicol, Ronald Pawlowski, Eric Robinson, William H. Sanders, Sankalp Singh, Alfonso Valdes, Bradley Woodworth, Michael Zhivich |
Securing Current and Future Process Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007, pp. 99-115, 2007, Springer, 978-0-387-75461-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
secure platforms, vulnerability testing, access control, intrusion detection, Process control systems |
35 | Marcelo Masera, Igor Nai Fovino |
A Service-Oriented Approach for Assessing Infrastructure Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007, pp. 367-379, 2007, Springer, 978-0-387-75461-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
systemof- systems, services, attacks, vulnerabilities, threats, Security assessment |
35 | Marie-Elena C. Kidd |
Ensuring critical event sequences in high consequence computer based systems as inspired by path expressions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECBS ![In: 1997 Workshop on Engineering of Computer-Based Systems (ECBS '97), March 24-28, 1997, Monterey, CA, USA, pp. 483-490, 1997, IEEE Computer Society, 0-8186-7889-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
critical event sequences, unstable operating environments, fault managemen, high consequence software, embedding checkpoints, update points, finite automata, path expressions, computer based systems, hardware failures, critical software |
34 | M. Aater Suleman, Onur Mutlu, Moinuddin K. Qureshi, Yale N. Patt |
Accelerating critical section execution with asymmetric multi-core architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASPLOS ![In: Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2009, Washington, DC, USA, March 7-11, 2009, pp. 253-264, 2009, ACM, 978-1-60558-406-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
heterogeneous cores, parallel programming, cmp, multi-core, locks, critical sections |
34 | Karthik Pattabiraman, Vinod Grover, Benjamin G. Zorn |
Samurai: protecting critical data in unsafe languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, pp. 219-232, 2008, ACM, 978-1-60558-013-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
critical memory, error recovery, memory safety |
34 | Shiping Yang, Nan Sang, Guangze Xiong |
Safety Testing of Safety Critical Software Based on Critical Mission Duration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 3-5 March 2004, Papeete, Tahiti, pp. 97-102, 2004, IEEE Computer Society, 0-7695-2076-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Safety Testing, Safety Critical System, Bayesian Analysis, Stopping Rules, Reliability Testing |
33 | Peter Dalsgård, Eva Eriksson, Lone Koefoed Hansen |
Rethinking information handling: designing for information offload. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Computing ![In: Proceedings of the 4th Decennial Conference on Critical Computing: Between Sense and Sensibility, 2005, Aarhus, Denmark, August 20-24, 2005, pp. 161-164, 2005, ACM, 1-59593-203-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
information offload, HCI, interaction design, information overload, critical design |
33 | Joanne M. Atlee, John A. McDermid |
Integrating requirements analysis and safety analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RE ![In: Second IEEE International Symposium on Requirements Engineering, March 27 - 29, 1995, York, England, UK, pp. 158-159, 1995, IEEE Computer Society, 0-8186-7017-7. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
system safety requirements, design description, formal specification, systems analysis, requirements analysis, requirements specification, safety critical systems, safety-critical software, safety critical software, functional requirements, safety analysis, high level design |
33 | Wayne D. Gray, Philippe A. Palanque, Fabio Paternò |
Introduction to the special issue on interface issues and designs for safety-critical interactive systems: when there is no room for user error. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Hum. Interact. ![In: ACM Trans. Comput. Hum. Interact. 6(4), pp. 309-310, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
33 | Akio Doi, Satoshi Suzuki, Koji Koyamada, Shinji Sannakanishi |
Vortex flow visualization using tetrahedral cell subdivision. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PG ![In: 5th Pacific Conference on Computer Graphics and Applications, PG 1997, Seoul, South Korea, October 13-16, 1997, pp. 206-, 1997, IEEE Computer Society, 0-8186-8028-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
vortex flow visualization, tetrahedral cell subdivision, critical point searching technique, velocity vector, trilinear interpolation function, hexahedral cell, multiple critical points, linear interpolation function, numerical integration scheme, precise position calculation, Newton's method, vortices |
32 | Jill Slay, Michael Miller |
Lessons Learned from the Maroochy Water Breach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007, pp. 73-82, 2007, Springer, 978-0-387-75461-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SCADA security, Maroochy Water Services breach |
32 | Rodrigo Chandia, Jesús González 0004, Tim Kilpatrick, Mauricio Papa, Sujeet Shenoi |
Security Strategies for SCADA Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007, pp. 117-131, 2007, Springer, 978-0-387-75461-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SCADA networks, forensics, security services |
32 | Paul W. Oman, Matthew Phillips |
Intrusion Detection and Event Monitoring in SCADA Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007, pp. 161-173, 2007, Springer, 978-0-387-75461-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SCADA networks, Intrusion detection, real-time monitoring |
32 | Jeffrey S. Simonoff, Carlos E. Restrepo, Rae Zimmerman, Zvia Naphtali |
Analysis of Electrical Power and Oil and Gas Pipeline Failures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007, pp. 381-394, 2007, Springer, 978-0-387-75461-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Electrical power, oil and gas pipelines, count regression models, risk |
32 | Janica Edmonds, Mauricio Papa, Sujeet Shenoi |
Security Analysis of Multilayer SCADA Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007, pp. 205-221, 2007, Springer, 978-0-387-75461-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Multilayer protocols, Modbus TCP, formal methods, security analysis |
32 | Mark Blythe, Darren J. Reed, Peter C. Wright, Andrew F. Monk |
Critical perspectives on dependability: an older person's experience of assistive technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Computing ![In: Proceedings of the 4th Decennial Conference on Critical Computing: Between Sense and Sensibility, 2005, Aarhus, Denmark, August 20-24, 2005, pp. 169-172, 2005, ACM, 1-59593-203-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Eevi E. Beck |
Learning management systems: the need for critical analyses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Computing ![In: Proceedings of the 4th Decennial Conference on Critical Computing: Between Sense and Sensibility, 2005, Aarhus, Denmark, August 20-24, 2005, pp. 173-176, 2005, ACM, 1-59593-203-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
educational methods, education, accessibility, control, LMS, learning management systems, standardisation |
32 | Søren Pold |
The critical interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Computing ![In: Proceedings of the 4th Decennial Conference on Critical Computing: Between Sense and Sensibility, 2005, Aarhus, Denmark, August 20-24, 2005, pp. 109-112, 2005, ACM, 1-59593-203-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
interface criticism, HCI, art, aesthetics |
32 | Feruza Sattarova Yusufovna, Farkhod Alisherov Alisherovich, Minkyu Choi, Eun-suk Cho, Furkhat Tadjibayev Abdurashidovich, Tai-Hoon Kim |
Research on Critical Infrastructures and Critical Information Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BLISS ![In: 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security, BLISS 2009, Edingburgh, United Kingdom, August 20-21 2009, pp. 97-101, 2009, IEEE Computer Society, 978-0-7695-3754-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
critical information infrastructure, energy, manufacture, health, icon, finance, law, critical infrastructure, people, problem, food |
32 | Stijn Eyerman, Lieven Eeckhout |
Modeling critical sections in Amdahl's law and its implications for multicore design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCA ![In: 37th International Symposium on Computer Architecture (ISCA 2010), June 19-23, 2010, Saint-Malo, France, pp. 362-370, 2010, ACM, 978-1-4503-0053-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
synchronization, critical sections, analytical performance modeling, Amdahl's law |
32 | Lindsay Grace |
Critical gameplay. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Advances in Computer Entertainment Technology ![In: Proceedings of the International Conference on Advances in Computer Entertainment Technology, ACE 2009, Athens, Greece, October 29-31, 2009, pp. 444, 2009, ACM, 978-1-60558-864-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
computer game art, critical gameplay, computer game theory |
32 | Thomas Grill, Margit Blauhut |
Design Patterns Applied in a User Interface Design (UID) Process for Safety Critical Environments (SCEs). ![Search on Bibsonomy](Pics/bibsonomy.png) |
USAB ![In: HCI and Usability for Education and Work, 4th Symposium of the Workgroup Human-Computer Interaction and Usability Engineering of the Austrian Computer Society, USAB 2008, Graz, Austria, November 20-21, 2008. Proceedings, pp. 459-474, 2008, Springer, 978-3-540-89349-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Safety critical environments, HCI, patterns |
32 | Tomoyuki Nieda, Alexander A. Pasko, Tosiyasu L. Kunii |
Detection and Classification of Critical Points for Linear Metamorphosis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CW ![In: 3rd International Conference on Cyberworlds (CW 2004), 18-20 November 2004, Tokyo, Japan, pp. 384-391, 2004, IEEE Computer Society, 0-7695-2140-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
classification, homotopy, critical points, Morse theory, Metamorphosis |
32 | Richard A. DeMillo, Hsin Pan, Eugene H. Spafford |
Critical Slicing for Software Fault Localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSTA ![In: Proceedings of the 1996 International Symposium on Software Testing and Analysis, ISSTA 1996, San Diego, CA, USA, January 8-10, 1996, pp. 121-134, 1996, ACM, 0-89791-787-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
critical slicing, static program slicing, testing, debugging, failures, faults, fault localization, mutation analysis, dynamic program slicing |
31 | Jonathan White, Brajendra Panda |
Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings, pp. 208-221, 2009, Springer, 978-3-642-10771-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Valeria Bonagura, Chiara Foglietta, Stefano Panzieri, Massimiliano Rossi 0005, Riccardo Santini, Monica Scannapieco, Luisa Franchina |
Modeling and Assessing the Impacts of Cyber Threats on Interdependent Critical Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection XVII - 17th IFIP WG 11.10 International Conference, ICCIP 2023, Arlington, VA, USA, March 13-14, 2023, Revised Selected Papers, pp. 143-163, 2023, Springer, 978-3-031-49584-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
30 | Rajesh Kumar 0012, Siddhant Singh, Rohan Kela |
Analyzing Advanced Persistent Threats Using Game Theory: A Critical Literature Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection XV - 15th IFIP WG 11.10 International Conference, ICCIP 2021, Virtual Event, March 15-16, 2021, Revised Selected Papers, pp. 45-69, 2021, Springer, 978-3-030-93510-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
30 | Gemma Galdon Clavell, Victoria Peuvrelle |
Ethical Issues in Big Data Analytics for Time Critical Mobility Forecasting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Big Data Analytics for Time-Critical Mobility Forecasting ![In: Big Data Analytics for Time-Critical Mobility Forecasting, From Raw Data to Trajectory-Oriented Mobility Analytics in the Aviation and Maritime Domains., pp. 343-358, 2020, Springer, 978-3-030-45163-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
30 | Rajesh Kumar 0012 |
A Model-Based Safety-Security Risk Analysis Framework for Interconnected Critical Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection XIV - 14th IFIP WG 11.10 International Conference, ICCIP 2020, Arlington, VA, USA, March 16-17, 2020, Revised Selected Papers, pp. 283-306, 2020, Springer, 978-3-030-62839-0. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
30 | Tim Ellis, Michael Locasto, David Balenson |
Cyber State Requirements for Design and Validation of Trust in the Critical Transportation Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection XIV - 14th IFIP WG 11.10 International Conference, ICCIP 2020, Arlington, VA, USA, March 16-17, 2020, Revised Selected Papers, pp. 69-83, 2020, Springer, 978-3-030-62839-0. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
30 | J. Peter Brady, Sergey Bratus, Sean W. Smith |
Dynamic Repair of Mission-Critical Applications with Runtime Snap-Ins. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection XIII - 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11-12, 2019, Revised Selected Papers, pp. 235-252, 2019, Springer, 978-3-030-34646-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
30 | Trevor MacLean, Robert Borrelli, Michael Haney |
Cyber Security Modeling of Non-Critical Nuclear Power Plant Digital Instrumentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection XIII - 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11-12, 2019, Revised Selected Papers, pp. 87-100, 2019, Springer, 978-3-030-34646-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
30 | Antonio Di Pietro, Stefano Panzieri, Andrea Gasparri |
Distributed Data Fusion for Situational Awareness in Critical Infrastructures with Link Failures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection XI - 11th IFIP WG 11.10 International Conference, ICCIP 2017, Arlington, VA, USA, March 13-15, 2017, Revised Selected Papers, pp. 99-117, 2017, Springer, 978-3-319-70394-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
30 | Luca Galbusera, Georgios Giannopoulos |
Exploiting Web Ontologies for Automated Critical Infrastructure Data Retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection XI - 11th IFIP WG 11.10 International Conference, ICCIP 2017, Arlington, VA, USA, March 13-15, 2017, Revised Selected Papers, pp. 119-136, 2017, Springer, 978-3-319-70394-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
30 | Alessandro Niglia, Carlos Veraza |
Building Resilience Through Social Media After an Attack on Critical Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges ![In: Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges, pp. 3-13, 2016, IOS Press, 978-1-61499-698-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Francesco Cavallaro, Andrea Chiappetta, Massimiliano De Santis, Anna Pinnarelli |
Critical Infrastructure Protection: Smart Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges ![In: Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges, pp. 18-22, 2016, IOS Press, 978-1-61499-698-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Edoardo Camilli |
OSINT, Big Data & Critical Infrastructures Protection (CIP). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges ![In: Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges, pp. 35-42, 2016, IOS Press, 978-1-61499-698-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Anke Schmidt-Felzmann |
"Sweden Under Attack!" Lessons from Past Incidents for Coping with a Comprehensive Synchronized Attack on Critical Energy and Information Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges ![In: Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges, pp. 63-78, 2016, IOS Press, 978-1-61499-698-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Antonia Colibasanu |
NATO's Frontier Critical Infrastructure Protection Buildup - Discussion on the Romanian Energy Sector Protection Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges ![In: Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges, pp. 43-52, 2016, IOS Press, 978-1-61499-698-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Gianluca Baldassarre |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges ![In: Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges, pp. 97-105, 2016, IOS Press, 978-1-61499-698-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Gianni Cuozzo |
Critical Infrastructure Cyber-Attack Through Firmware Exploitation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges ![In: Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges, pp. 115-134, 2016, IOS Press, 978-1-61499-698-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
30 | George Stergiopoulos, Efstratios Vasilellis, Georgia Lykou, Panayiotis Kotzanikolaou, Dimitris Gritzalis |
Classification and Comparison of Critical Infrastructure Protection Tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection X - 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers, pp. 239-255, 2016, 978-3-319-48736-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Michael Quigg, Juan Lopez Jr., Mason Rice, Michael R. Grimaila, Benjamin W. P. Ramsey |
Cyberspace and Organizational Structure: An Analysis of the Critical Infrastructure Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection X - 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers, pp. 3-25, 2016, 978-3-319-48736-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Carol J. Romanowski, Rajendra K. Raj, Jennifer Schneider 0001, Sumita Mishra, Bernard Brooks, Jessica Pardee, Bharat Bhole, Nikolaus Robalino |
A Multidisciplinary Predictive Model for Managing Critical Infrastructure Disruptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection X - 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers, pp. 203-218, 2016, 978-3-319-48736-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Bernhard Schneidhofer, Stephen D. Wolthusen |
Multigraph Critical Infrastructure Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection X - 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers, pp. 149-167, 2016, 978-3-319-48736-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Christine Izuakor, Richard White |
Critical Infrastructure Asset Identification: Policy, Methodology and Gap Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection X - 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers, pp. 27-41, 2016, 978-3-319-48736-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Vicenç Puig, Teresa Escobet, Ramon Sarrate, Joseba Quevedo |
Fault Diagnosis and Fault Tolerant Control in Critical Infrastructure Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems ![In: Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems, pp. 263-299, 2015, Springer, 978-3-662-44159-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Georgios Ellinas, Christos G. Panayiotou, Elias Kyriakides, Marios M. Polycarpou |
Critical Infrastructure Systems: Basic Principles of Monitoring, Control, and Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems ![In: Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems, pp. 1-30, 2015, Springer, 978-3-662-44159-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Chiara Foglietta, Stefano Panzieri, Federica Pascucci |
Algorithms and Tools for Risk/Impact Evaluation in Critical Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems ![In: Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems, pp. 227-238, 2015, Springer, 978-3-662-44159-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Cesare Alippi, Romolo Camplani, Antonio Marullo, Manuel Roveri |
Algorithms and Tools for Intelligent Monitoring of Critical Infrastructure Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems ![In: Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems, pp. 167-184, 2015, Springer, 978-3-662-44159-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Mietek A. Brdys |
Algorithms and Tools for Intelligent Control of Critical Infrastructure Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems ![In: Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems, pp. 185-226, 2015, Springer, 978-3-662-44159-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Attila Vidács, Rolland Vida |
Wireless Sensor Network Based Technologies for Critical Infrastructure Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems ![In: Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems, pp. 301-316, 2015, Springer, 978-3-662-44159-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Milan Bigovic, Ana Rakocevic |
Challenges in Defining Critical Infrastructure in Montenegro. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection ![In: Comprehensive Approach as `Sine Qua Non` for Critical Infrastructure Protection, pp. 267-276, 2015, IOS Press, 978-1-61499-477-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Farshad Mohammad-Avvali, Alessandro Niglia |
Future Activities in Critical Energy Infrastructure Protection - Recommendations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Protection of Critical Energy Infrastructure Against Emerging Security Challenges ![In: The Protection of Critical Energy Infrastructure Against Emerging Security Challenges, pp. 149-153, 2015, IOS Press, 978-1-61499-571-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Samir Agic, Edin Garaplija |
Risk Management of Terrorist Attacks in the Tunnels as Critical Points of Corridor 5c Infrastructure - Trans-European Road Network Through Bosnia and Herzegovina. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection ![In: Comprehensive Approach as `Sine Qua Non` for Critical Infrastructure Protection, pp. 277-289, 2015, IOS Press, 978-1-61499-477-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Jaka Vadnjal |
Corruption: From Generally Accepted Business Practice to Serious Threat to Critical Infrastructure Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection ![In: Comprehensive Approach as `Sine Qua Non` for Critical Infrastructure Protection, pp. 19-29, 2015, IOS Press, 978-1-61499-477-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Riccardo Dugulin |
The Potential Cooperation Between NATO and Private Risk Management Companies in the Protection of Critical Energy Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Protection of Critical Energy Infrastructure Against Emerging Security Challenges ![In: The Protection of Critical Energy Infrastructure Against Emerging Security Challenges, pp. 89-99, 2015, IOS Press, 978-1-61499-571-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Ferdinand Odzakov, Metodija Dojcinovski |
Contemporary Aspects in Critical Infrastructure Protection and Combating Terrorism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection ![In: Comprehensive Approach as `Sine Qua Non` for Critical Infrastructure Protection, pp. 3-18, 2015, IOS Press, 978-1-61499-477-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Milan Tarman |
Security Vetting in Relation to the Critical Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection ![In: Comprehensive Approach as `Sine Qua Non` for Critical Infrastructure Protection, pp. 120-131, 2015, IOS Press, 978-1-61499-477-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Zoran Kekovic, Vladimir Ninkovic |
Towards a Resilient Critical Infrastructure System against the Risk of Terrorism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection ![In: Comprehensive Approach as `Sine Qua Non` for Critical Infrastructure Protection, pp. 45-58, 2015, IOS Press, 978-1-61499-477-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Kutjim Proseku |
The Critical Energy Infrastructure Protection Against Emerging Security Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Protection of Critical Energy Infrastructure Against Emerging Security Challenges ![In: The Protection of Critical Energy Infrastructure Against Emerging Security Challenges, pp. 41-49, 2015, IOS Press, 978-1-61499-571-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Metodi Hadji-Janev |
Changing the Approach to Energy Security: Critical Energy Infrastructure Protection in Context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Protection of Critical Energy Infrastructure Against Emerging Security Challenges ![In: The Protection of Critical Energy Infrastructure Against Emerging Security Challenges, pp. 16-25, 2015, IOS Press, 978-1-61499-571-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Mile Sikman, Nevenko Vranjes |
Terrorist Threats to Critical Infrastructure in BiH and Protection Measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection ![In: Comprehensive Approach as `Sine Qua Non` for Critical Infrastructure Protection, pp. 251-266, 2015, IOS Press, 978-1-61499-477-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Metodi Hadji-Janev |
Protecting Critical Information Infrastructure from Terrorist Attacks in South East Europe: How Real is the Threat? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection ![In: Comprehensive Approach as `Sine Qua Non` for Critical Infrastructure Protection, pp. 91-106, 2015, IOS Press, 978-1-61499-477-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Mesut Hakki Casin |
Critical Infrastructure Protection (CIP) and Southern Gas Corridor Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Protection of Critical Energy Infrastructure Against Emerging Security Challenges ![In: The Protection of Critical Energy Infrastructure Against Emerging Security Challenges, pp. 50-56, 2015, IOS Press, 978-1-61499-571-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Sandro Bologna, Alessandro Lazari, Stefano Mele |
Improving Critical Infrastructure Protection and Resilience against Terrorism Cyber Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection ![In: Comprehensive Approach as `Sine Qua Non` for Critical Infrastructure Protection, pp. 79-90, 2015, IOS Press, 978-1-61499-477-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Stojan Slaveski, Oliver Bakreski |
Security of Classified Information as Part of the National Critical Infrastructure Protection: Macedonian Experience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection ![In: Comprehensive Approach as `Sine Qua Non` for Critical Infrastructure Protection, pp. 107-119, 2015, IOS Press, 978-1-61499-477-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Jadran Perinic, Robert Mikac |
Protection of the Critical Infrastructure from Terrorism: Case Study of the Republic of Croatia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection ![In: Comprehensive Approach as `Sine Qua Non` for Critical Infrastructure Protection, pp. 235-250, 2015, IOS Press, 978-1-61499-477-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Alessandro Niglia |
Critical Infrastructure Protection (CEIP) with a Focus on Energy Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Protection of Critical Energy Infrastructure Against Emerging Security Challenges ![In: The Protection of Critical Energy Infrastructure Against Emerging Security Challenges, pp. 5-15, 2015, IOS Press, 978-1-61499-571-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Christopher W. Badenhop, Jonathan D. Fuller, Joseph Hall, Benjamin W. P. Ramsey, Mason Rice |
Evaluating ITU-T G.9959 Based Wireless Systems Used in Critical Infrastructure Assets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection IX - 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers, pp. 209-227, 2015, Springer, 978-3-319-26566-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Somya Joshi, Teresa Cerratto Pargman |
In search of fairness: critical design alternatives for sustainability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Aarhus Conference on Critical Alternatives ![In: Proceedings of The Fifth Decennial Aarhus Conference on Critical Alternatives, 2015, Aarhus, Denmark, August 17-21, 2015., pp. 37-40, 2015, Aarhus University Press / ACM. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
30 | Erik Grönvall, Nervo Verdezoto, Naveen Bagalkot, Tomas Sokoler |
Concordance: a critical participatory alternative in healthcare IT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Aarhus Conference on Critical Alternatives ![In: Proceedings of The Fifth Decennial Aarhus Conference on Critical Alternatives, 2015, Aarhus, Denmark, August 17-21, 2015., pp. 21-24, 2015, Aarhus University Press / ACM. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
Displaying result #1 - #100 of 38275 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|