default search action
Search dblp for Publications
export results for "toc:db/journals/ijcip/ijcip40.bht:"
@article{DBLP:journals/ijcip/AshworthSS23, author = {James Ashworth and Jason Staggs and Sujeet Shenoi}, title = {Radio frequency identification and tracking of vehicles and drivers by exploiting keyless entry systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {40}, pages = {100587}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2022.100587}, doi = {10.1016/J.IJCIP.2022.100587}, timestamp = {Sun, 16 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/AshworthSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/BitirgenF23, author = {K{\"{u}}bra Bitirgen and {\"{U}}mm{\"{u}}han Basaran Filik}, title = {A hybrid deep learning model for discrimination of physical disturbance and cyber-attack detection in smart grid}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {40}, pages = {100582}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2022.100582}, doi = {10.1016/J.IJCIP.2022.100582}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/BitirgenF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/FanTL23, author = {Bing Fan and Hongtao Tan and Yaqun Li}, title = {Critical link identification algorithm for power communication networks in {SDN} architecture}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {40}, pages = {100584}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2022.100584}, doi = {10.1016/J.IJCIP.2022.100584}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/FanTL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/TiongV23, author = {Achara Tiong and Hector A. Vergara}, title = {A two-stage stochastic multi-objective resilience optimization model for network expansion of interdependent power-water networks under disruption}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {40}, pages = {100588}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100588}, doi = {10.1016/J.IJCIP.2023.100588}, timestamp = {Sun, 16 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/TiongV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/WangSZDGC23, author = {Shuliang Wang and Jingya Sun and Jianhua Zhang and Qiqi Dong and Xifeng Gu and Chen Chen}, title = {Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {40}, pages = {100583}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2022.100583}, doi = {10.1016/J.IJCIP.2022.100583}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/WangSZDGC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.