The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for critical with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1959-1965 (15) 1966-1970 (15) 1971-1974 (27) 1975-1976 (18) 1977-1978 (24) 1979-1980 (40) 1981 (26) 1982 (28) 1983 (24) 1984 (32) 1985 (51) 1986 (43) 1987 (62) 1988 (83) 1989 (95) 1990 (118) 1991 (116) 1992 (181) 1993 (179) 1994 (229) 1995 (313) 1996 (334) 1997 (381) 1998 (458) 1999 (618) 2000 (729) 2001 (823) 2002 (1139) 2003 (1479) 2004 (1828) 2005 (2396) 2006 (2721) 2007 (2980) 2008 (2994) 2009 (1992) 2010 (1028) 2011 (796) 2012 (815) 2013 (826) 2014 (920) 2015 (953) 2016 (882) 2017 (1031) 2018 (1168) 2019 (1201) 2020 (1386) 2021 (1367) 2022 (1453) 2023 (1534) 2024 (324)
Publication types (Num. hits)
article(12908) book(50) data(2) incollection(316) inproceedings(24546) mastersthesis(1) phdthesis(335) proceedings(117)
Venues (Conferences, Journals, ...)
CoRR(1311) HICSS(411) CRITIS(397) FMICS(320) Critical Infrastructure Protec...(303) IEEE Trans. Comput. Aided Des....(252) DAC(247) IEEE Access(231) DATE(202) SSS(196) IPDPS(189) Discret. Math.(165) SAFECOMP(163) WSC(144) IEEE Trans. Very Large Scale I...(143) ICCAD(133) More (+10 of total 5196)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 23864 occurrences of 8654 keywords

Results
Found 38276 publication records. Showing 38275 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
29Cristina Satizábal, Rafael Páez, Jordi Forné PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF hierarchical trust model, peer-to-peer trust model, certification path discovery, critical information systems, Public Key Infrastructure (PKI)
29Peter Marwedel, Catherine H. Gebotys Secure and safety-critical vs. insecure, non safety-critical embedded systems: do they require completely different design approaches? Search on Bibsonomy CODES+ISSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, safety-critical
28Pan Li 0001, Chi Zhang 0001, Yuguang Fang Asymptotic connectivity in wireless ad hoc networks using directional antennas. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF asymptotic connectivity, critical transmission power, critical transmission range, wireless ad hoc networks, directional antenna
28Krzysztof Czarnecki 0001, Michael Himsolt, Ernst Richter, Falk Vieweg, Alfred Rosskopf DataFAN: A Practical Approach to Data Flow Analysis for Ada 95. Search on Bibsonomy Ada-Europe The full citation details ... 2002 DBLP  DOI  BibTeX  RDF language tools, verification, static analysis, quality assurance, safety critical, ASIS, SPARK, mission critical
28Norman F. Schneidewind Predictions for increasing confidence in the reliability of safety critical software. Search on Bibsonomy ICECCS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF residual faults, time to next failure, NASA Space Shuttle Primary Avionics Software System, reliability, software reliability, safety-critical software, safety critical software, confidence
27Honghai Zhang, Jennifer C. Hou Asymptotic critical total power for k-connectivity of wireless networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF critical power, wireless networks, connectivity, power control
27Mahboobeh Soleimani, Ali A. Ghorbani 0001 Critical Episode Mining in Intrusion Detection Alerts. Search on Bibsonomy CNSR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Episode mining, Critical episode, Alert mining, Multistage attack, Attack scenario
27Hiroki Satake, Haruna Marumoto, Kazuhisa Seta, Motohide Umano, Mitsuru Ikeda Learning Environment for Improving Critical Thinking Skills Based on New Synthesis Theory. Search on Bibsonomy KES (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF new synthesis, guidance information, critical thinking
27Shah M. Jahinuzzaman, Mohammad Sharifkhani, Manoj Sachdev Investigation of Process Impact on Soft Error Susceptibility of Nanometric SRAMs Using a Compact Critical Charge Model. Search on Bibsonomy ISQED The full citation details ... 2008 DBLP  DOI  BibTeX  RDF critical charge, process variation, Soft error, SRAM
27Yuanquan Wang 0001, Jia Liang, Yunde Jia On the Critical Point of Gradient Vector Flow Snake. Search on Bibsonomy ACCV (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF optimal stopping time, image segmentation, critical point, gradient vector flow, snake model
27Marco Antonio Cruz-Chavez, Juan Frausto Solís A New Algorithm That Obtains an Approximation of the Critical Path in the Job Shop Scheduling Problem. Search on Bibsonomy MICAI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF schedule, metaheuristic, Critical path, neighborhood, slack time
27Xudong Yao, Jianxin Zhou A local minimax characterization for computing multiple nonsmooth saddle critical points. Search on Bibsonomy Math. Program. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Locally Lipschitz Continuous Functionals, Nonsmooth Critical Points, Minimax Characterization
27Sandeep S. Kulkarni, Bezawada Bruhadeshwar Reducing the Cost of the Critical Path in Secure Multicast for Dynamic Groups. Search on Bibsonomy ICDCS Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Shared Keys, Multicast, Group Communication, Critical Path
27Marco Loog, Johannes Jisse Duistermaat, Luc Florack On the Behavior of Spatial Critical Points under Gaussian Blurring. A Folklore Theorem and Scale-Space Constraints. Search on Bibsonomy Scale-Space The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Large-scale behavior, loss of detail, nonnegative function, compact support, spatial critical point, deep structure
27Byung S. So, Charles R. Kime A fault simulation method: Parallel pattern critical path tracing. Search on Bibsonomy J. Electron. Test. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF parallel pattern simulation, single fault propagation, fault simulation, Critical path tracing
26Lee Baugh, Craig B. Zilles An Analysis of I/O And Syscalls In Critical Sections And Their Implications For Transactional Memory. Search on Bibsonomy ISPASS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Amotz Bar-Noy, Danny Dolev, Daphne Koller, David Peleg Fault-Tolerant Critical Section Management in Asynchronous Networks. Search on Bibsonomy WDAG The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
26Markku I. Nurminen e-Man and his e-Mancipation. Search on Bibsonomy Critical Computing The full citation details ... 2005 DBLP  DOI  BibTeX  RDF emanicipation, control, articulation work, IT Service, self-service
26Carlo Jacucci, Giulio Jacucci, Ina Wagner, Thomas Psik A manifesto for the performative development of ubiquitous media. Search on Bibsonomy Critical Computing The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Peter Bittner, Eva Hornecker A micro-ethical view on computing practice. Search on Bibsonomy Critical Computing The full citation details ... 2005 DBLP  DOI  BibTeX  RDF everyday work practice, moral improvisation, work culture, ethics, responsibility, professional practice, self-reflection
26Anne Marie Kanstrup, Ellen Christiansen Model power: still an issue? Search on Bibsonomy Critical Computing The full citation details ... 2005 DBLP  DOI  BibTeX  RDF model power, cognitive models, cooperative design, user involvement, design techniques
26Åke Walldius, Yngve Sundblad, Alan Borning A first analysis of the UsersAward programme from a value sensitive design perspective. Search on Bibsonomy Critical Computing The full citation details ... 2005 DBLP  DOI  BibTeX  RDF UsersAward programme, user-driven certification of software, workplace computing, participatory design, value sensitive design
26Claus Bossen, Peter Dalsgård Conceptualization and appropriation: the evolving use of a collaborative knowledge management system. Search on Bibsonomy Critical Computing The full citation details ... 2005 DBLP  DOI  BibTeX  RDF conceptualisation, design, knowledge management, participatory design, system development, tailorability, user involvement, appropriation
26H. Rex Hartson, José C. Castillo Remote evaluation for post-deployment usability improvement. Search on Bibsonomy AVI The full citation details ... 1998 DBLP  DOI  BibTeX  RDF remote usability evaluation, usability data, user-initiated, user-reported critical incident method, evaluation method, software deployment, critical incidents
26Susanne Jul, George W. Furnas Critical Zones in Desert Fog: Aids to Multiscale Navigation. Search on Bibsonomy ACM Symposium on User Interface Software and Technology The full citation details ... 1998 DBLP  DOI  BibTeX  RDF ZTracker, critical zone analysis, critical zones, space-scale diagrams, view-based navigational aids, view-navigation, navigation, browsing, multiscale, residue, information navigation, Pad++
26Roymond S. C. Shanahan Applying engineering of computer-based systems (ECBS) and product line center (PLC) approaches to the development of mission critical systems for the Department of Defense (DoD). Search on Bibsonomy HASE The full citation details ... 1996 DBLP  DOI  BibTeX  RDF product line center approach, mission critical systems development, Department of Defense, information systems development environment, systems development costs, software architectures, software tools, software reuse, initiatives, safety-critical software, computer-based systems engineering, ECBS
26Arkady Kanevsky, Peter C. Krupp, Paul J. Wallace Paradigm for building robust real-time distributed mission-critical systems. Search on Bibsonomy IEEE Real Time Technology and Applications Symposium The full citation details ... 1995 DBLP  DOI  BibTeX  RDF search radar, military systems, radar tracking, robust real-time distributed mission-critical systems building, long life-cycle defense system, stringent safety requirements, stringent timing requirements, stringent dependability requirements, multiple target tracking, surveillance radar system, system upgrade support, system hardware, baseline performance, SEI/CMU Simplex Architecture, prototypical industrial feedback control application, integrated standard technologies, real-time systems, reliability, fault tolerant computing, distributed processing, timing, software fault tolerance, target tracking, safety-critical software, system software, military computing, application software, computing paradigm
26Giuseppe Iazeolla, Raffaela Mirandola, Andrea D'Ambrogio Collaborative IV&V by SPEED: a tool-kit for the performance IV&V of critical software. Search on Bibsonomy WETICE The full citation details ... 1995 DBLP  DOI  BibTeX  RDF collaborative software verification, Software Performance Evaluation and Modeling, Master Model, performance analysis model, software workload model, abstract machine model, database management systems, program verification, performance predictions, software performance evaluation, database design, computer aided software engineering, safety-critical software, software performance engineering, SPEED, life cycle, hybrid simulation, software engineering methodology, software toolkit, critical software
26Dilian Gurov, Christian Lidström, Mattias Nyberg, Jonas Westman Deductive Functional Verification of Safety-Critical Embedded C-Code: An Experience Report. Search on Bibsonomy FMICS-AVoCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Philip Johnson-Freyd, Geoffrey C. Hulette, Zena M. Ariola Verification by Way of Refinement: A Case Study in the Use of Coq and TLA in the Design of a Safety Critical System. Search on Bibsonomy FMICS-AVoCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Arnaud Dieumegard, Andres Toom, Marc Pantel Block Library Driven Translation Validation for Dataflow Models in Safety Critical Systems. Search on Bibsonomy FMICS-AVoCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Axel Habermaier, Johannes Leupolz, Wolfgang Reif Unified Simulation, Visualization, and Formal Analysis of Safety-Critical Systems with. Search on Bibsonomy FMICS-AVoCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25Daphne R. Raban, Mihai Moldovan, Quentin Jones An empirical study of critical mass and online community survival. Search on Bibsonomy CSCW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF critical mass, online community system design, computer-mediated communication, chat, synchronous communication, irc
25Jeronimo Dzaack, Leon Urbas Multilevel Analysis of Human Performance Models in Safety-Critical Systems. Search on Bibsonomy HCI (11) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multilevel analysis, evaluation and design, human factor, tools, safety-critical systems, cognitive architectures, human performance models
25Zhipeng Lü, Jin-Kao Hao A Critical Element-Guided Perturbation Strategy for Iterated Local Search. Search on Bibsonomy EvoCOP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF perturbation operator, critical element-guided perturbation, course timetabling, graph coloring, iterated local search
25Harry Ku Teaching of Critical Path Networks Using Software Packages. Search on Bibsonomy RSKT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Engineering management science, Microsoft Project 2007, Quantitative Methods - Production and Operations Management (POM-QM) for Windows 3, Excel in Microsoft Office 2007 and critical path networks
25Bo-Zhou Chen, Hung-Ming Chen, Li-Da Huang, Po-Cheng Pan A stochastic-based efficient critical area extractor on OpenAccess platform. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF OpenAccess, critical area analysis
25Chung-Yuan Huang, Chia-Ying Cheng, Chuen-Tsai Sun Resource Limitations, Transmission Costs and Critical Thresholds in Scale-Free Networks. Search on Bibsonomy KES-AMSTA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Critical threshold, economic resource limitations, transmission costs, power-law degree distribution, scale-free networks
25Pao-Ann Hsiung, Yean-Ru Chen, Yen-Hung Lin Model Checking Safety-Critical Systems Using Safecharts. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Safecharts, extended timed automaton, model checking, Safety-critical systems
25Yean-Ru Chen, Pao-Ann Hsiung, Sao-Jie Chen Modeling and Automatic Failure Analysis of Safety-Critical Systems Using Extended Safecharts. Search on Bibsonomy SAFECOMP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Safecharts, FTO-failure, SO-failure, NC-failure, Effective repair actions, Ineffective repair actions, Safety-critical systems
25Claudio Balducelli, Antonio Di Pietro, Luisa Lavalle, Giordano Vicoli A Middleware Improved Technology (MIT) to Mitigate Interdependencies between Critical Infrastructures. Search on Bibsonomy WADS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF middleware technology, jms, java, information sharing, situation awareness, soap, risk assessment, application server, critical infrastructure, interdependencies, ejb
25Yu-Shen Liu, Min Liu 0018, Daisuke Kihara, Karthik Ramani Salient critical points for meshes. Search on Bibsonomy Symposium on Solid and Physical Modeling The full citation details ... 2007 DBLP  DOI  BibTeX  RDF saliency, critical points, Morse theory
25Tridib Mukherjee, Krishna K. Venkatasubramanian, Sandeep K. S. Gupta Performance modeling of critical event management for ubiquitous computing applications. Search on Bibsonomy MSWiM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ubiquitous computing, autonomic computing, safety-critical systems, event management, proactive computing
25Per Mellstrand, Rune Gustavsson Experiment Based Validation of CIIP. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Resilient Software, Critical Infrastructures, Vulnerability Assessment
25Andrew J. Kornecki, Janusz Zalewski Experimental evaluation of software development tools for safety-critical real-time systems. Search on Bibsonomy Innov. Syst. Softw. Eng. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Tool qualification, Safety-critical systems, CASE tools, Software safety
25Hermann Kopetz On the Fault Hypothesis for a Safety-Critical Real-Time System. Search on Bibsonomy ASWSD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Fault-Hypothesis, Error-Containment, State Repair, Fault-tolerance, Error Detection, Safety-Critical Systems
25Feng-Tse Lin, Jing-Shing Yao Fuzzy Critical Path Method Based on Signed-Distance Ranking and Statistical Confidence-Interval Estimates. Search on Bibsonomy J. Supercomput. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF signed-distance ranking, confidence-interval estimate, fuzzy set, activity network, critical path method
25Paul Townend, Jie Xu 0007, Malcolm Munro Building Dependable Software for Critical Applications: Multi-Version Software versus One Good Version. Search on Bibsonomy WORDS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Critical software and systems, industrial embedded systems, multi-version software, reliability and safety, fault tolerance
25Gerald M. Karam, Raymond J. A. Buhr Starvation and Critical Race Analyzers for Ada. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF race analyzers, critical race analysis tools, Ada designs, temporal analysis toolset, operational specification language, language interpreter, deadlock analyzer, starvation analyzer, set-theoretic model, deadlock analyzer, computation space, preprocessing phase, starvation tool, semiautomatic proof, nondeterministic rendezvous, human operator, design examples, Ada, software tools, programming, specification languages, system recovery, liveness, program interpreters
25Gerald M. Karam, Christine M. Stanczyk, Gregory W. Bond Critical Races in Ada Programs. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1989 DBLP  DOI  BibTeX  RDF critical races, concurrent Ada programs, system errors, CRF language, caller selection mechanism, discriminatory mutual exclusion, dimutex, MLog language, gas-station example, parallel programming, Ada, rapid-prototyping, Ada language
25Francesco Flammini, Valeria Vittorini, Nicola Mazzocca, Concetta Pragliola A Study on Multiformalism Modeling of Critical Infrastructures. Search on Bibsonomy CRITIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Multiformalism Modeling, Security, Performability, Dependability, Critical Infrastructure
25Rüdiger Klein Information Modelling and Simulation in Large Dependent Critical Infrastructures - An Overview on the European Integrated Project IRRIIS. Search on Bibsonomy CRITIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CI dependency, federated simulation, improved CI communication and management, dependability, information models, simulation environment, critical infrastructures
25Anas Abou El Kalam, Yves Deswarte Critical Infrastructures Security Modeling, Enforcement and Runtime Checking. Search on Bibsonomy CRITIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security policies and models, access control enforcement, security of critical infrastructures, runtime model checking
24Ronald J. Kohl AIAA (Draft) Guidebook "Managing the Use of Commercial Off-the-Shelf (COTS) Software Components for Mission Critical Systems". Search on Bibsonomy ICCBSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Eric A. M. Luiijf, Marieke H. A. Klaver Protecting a nation's critical infrastructure: the first steps. Search on Bibsonomy SMC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Brian A. Fields, Shai Rubin, Rastislav Bodík Focusing processor policies via critical-path prediction. Search on Bibsonomy ISCA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
24Nassir Navab, Olivier D. Faugeras The Critical Sets of Lines for Camera Displacement Estimation: A Mixed Euclidean-Projective and Constructive Approach. Search on Bibsonomy Int. J. Comput. Vis. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
24Jason Staggs, Sujeet Shenoi (eds.) Critical Infrastructure Protection XVII - 17th IFIP WG 11.10 International Conference, ICCIP 2023, Arlington, VA, USA, March 13-14, 2023, Revised Selected Papers Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
24Raza Ahmad, Aniket Modi, Eunjin Jung, Carolina de Senne Garcia, Hassaan Irshad, Ashish Gehani Analyzing Discrepancies in Whole-Network Provenance. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24James Wright, Stephen D. Wolthusen A Contextual Integrity Property to Impede Privacy Violations in 5G Networks. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Richard White Redefining Homeland Security. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Scott Anderson, Tucker Bell, Patrick Egan, Nathan Weinshenker, Paul Barford Measuring the Impacts of Power Outages on Internet Hosts in the United States. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Øyvind Anders Arntzen Toftegaard, Doney Abraham, Sujeet Shenoi, Bernhard M. Hämmerli Smart-Grid-Enabled Business Cases and the Consequences of Cyber Attacks. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Doney Abraham, Øyvind Anders Arntzen Toftegaard, Alemayehu Gebremedhin, Sule Yayilgan Consequence Verification During Risk Assessments of Smart Grids. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Edward Martin, Sujeet Shenoi Real-Time Attack Detection in Modern Automobile Controller Area Networks. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Dee Meng Kang, Haadee Faahym, Souhail Meftah, Sye Loong Keoh, Khin Mi Mi Aung Practical Deep Neural Network Protection for Unmodified Applications in Intel Software Guard Extension Environments. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Raymond H. Chan, Wye Kaye Yan, Jung Man Ma, Kai Mun Loh, Tan Yu, Malcolm Y. H. Low, Habib Rehman, Thong Chee Phua Security-Enhanced Orchestration Platform for Building Management Systems. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Kameron Tillman, Jason Staggs, Sujeet Shenoi A Cyber Security Analysis Methodology for Evaluating Automobile Risk Exposures. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Jason Staggs, Sujeet Shenoi (eds.) Critical Infrastructure Protection XV - 15th IFIP WG 11.10 International Conference, ICCIP 2021, Virtual Event, March 15-16, 2021, Revised Selected Papers Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Jason Staggs, Sujeet Shenoi (eds.) Critical Infrastructure Protection XVI - 16th IFIP WG 11.10 International Conference, ICCIP 2022, Virtual Event, March 14-15, 2022, Revised Selected Papers Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Amani Abou Rida, Rabih Amhaz, Pierre Parrend Anomaly Detection on Static and Dynamic Graphs Using Graph Convolutional Neural Networks. Search on Bibsonomy Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Francesco Colace, Massimo De Santo, Francesco Marongiu, Domenico Santaniello, Alfredo Troiano Secure Medical Data Sharing Through Blockchain and Decentralized Models. Search on Bibsonomy Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Passent Mohammed El-Kafrawy, Mohamed Bennawy Walk Through Event Stream Processing Architecture, Use Cases and Frameworks Survey. Search on Bibsonomy Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Mario Casillo, Francesco Colace, Angelo Lorusso, Francesco Marongiu, Domenico Santaniello An IoT-Based System for Expert User Supporting to Monitor, Manage and Protect Cultural Heritage Buildings. Search on Bibsonomy Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Ashutosh Kumar, Aditya Upadhyay, Neha Mishra, Srawan Nath, Kalu Ram Yadav, Gajanand Sharma Privacy and Security Concerns in Edge Computing-Based Smart Cities. Search on Bibsonomy Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Dmitry Kushnir, Maxim Kovtsur, Ammar Muthanna, Anastasiia Kistruga, Mark Akilov, Anton Batalov Developing Instrument for Investigation of Blockchain Technology. Search on Bibsonomy Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Johannes Meister, Kim Ho Yeap, Magdalene Wan Ching Goh, Humaira Nisar, Johannes Fischer 0005, Hans Meier The Design of a Pheromone-Based Robotic Varroa Trap for Beekeeping Applications. Search on Bibsonomy Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Kriti Aggarwal, Sunil K. Singh 0002, Muskaan Chopra, Sudhakar Kumar, Francesco Colace Deep Learning in Robotics for Strengthening Industry 4.0.: Opportunities, Challenges and Future Directions. Search on Bibsonomy Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Nidhee Kamble Commercializing Blockchain in a Smart City: Autonomous Vehicles, Cryptocurrency, and Contract Law. Search on Bibsonomy Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Veenu Rani, Munish Kumar, Ajay Mittal, Krishan Kumar 0001 Artificial Intelligence for Cybersecurity: Recent Advancements, Challenges and Opportunities. Search on Bibsonomy Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Fabio Sisi, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller Creation of a Dataset Modeling the Behavior of Malware Affecting the Confidentiality of Data Managed by IoT Devices. Search on Bibsonomy Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Jasmeen Kaur Chahal, Vidhyotma Gandhi, Payal Kaushal A Taxonomy of DDoS Defense Mechanism in Software Defined Networking (SDN). Search on Bibsonomy Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Phuc Do Finding All Shortest Meaningful Meta-Paths Between Two Vertices of a Secured Large Heterogeneous Information Network Using Distributed Algorithm. Search on Bibsonomy Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24James Cervini, Daniel Muller, Alexander Beall, Joseph Maurio, Aviel Rubin, Lanier A. Watkins Trusted Virtualization-Based Programmable Logic Controller Resilience Using a Backfit Approach. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Øyvind Anders Arntzen Toftegaard, Janne Hagen, Bernhard M. Hämmerli Are European Security Policies Ready for Advanced Metering Systems with Cloud Back-Ends? Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Laura Tinnel, Ulf Lindqvist Importance of Cyber Security Analysis in the Operational Technology System Lifecycle. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Noah Diamond, Scott R. Graham, Gilbert Clark Securing Infiniband Traffic with Bluefield-2 Data Processing Units. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Elizabeth Kurkowski, Mason Rice, Sujeet Shenoi Detecting Part Anomalies Induced by Cyber Attacks on a Powder BED Fusion Additive Manufacturing System. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Muhammad Haris Rais, Muhammad Ahsan, Vaibhav Sharma 0004, Radhika Barua, Rob Prins, Irfan Ahmed 0001 Low-Magnitude Infill Structure Manipulation Attacks on Fused Filament Fabrication 3D Printers. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Elizabeth Kurkowski, Alyxandra Van Stockum, Joel A. Dawson, Curtis Taylor, Tricia Schulz, Sujeet Shenoi Manipulation of G-Code Toolpath Files in 3D Printers: Attacks and Mitigations. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Alyxandra Van Stockum, Elizabeth Kurkowski, Tiffany Potok, Curtis Taylor, Joel A. Dawson, Mason Rice, Sujeet Shenoi Attack-Defense Modeling of Material Extrusion Additive Manufacturing Systems. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Neal Ziring National Cyber Resilience and Roles for Public and Private Sector Stakeholders. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Samuel Chadwick, Scott R. Graham, James Dean, Matthew Dallmeyer Leveraging Confidential Computing to Enable Secure Information Sharing. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Calvin Muramoto, Scott R. Graham, Stephen Dunlap Evaluating the Use of Boot Image Encryption on the TALOS II Architecture. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Kyle Hintze, Scott R. Graham, Stephen Dunlap, Patrick Sweeney InfiniBand Network Monitoring: Challenges and Possibilities. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Yu Han Chu, Sye Loong Keoh, Chee Kiat Seow, Qi Cao 0002, Kai Wen, Soon Yim Tan GPS Signal Authentication Using a Chameleon Hash Keychain. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Brandt Reutimann, Indrakshi Ray Simulating Measurement Attacks in a Scada System Testbed. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Syed Ali Qasim, Adeen Ayub, Jordan Johnson, Irfan Ahmed 0001 Attacking the IEC 61131 Logic Engine in Programmable Logic Controllers. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Tim Ellis, David Balenson, Michael Locasto Cyber Security Awareness Requirements for Operational Technology Systems. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Ken Yau, Kam-Pui Chow, Siu-Ming Yiu Detecting Anomalous Programmable Logic Controller Events Using Process Mining. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 38275 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license