default search action
Search dblp for Publications
export results for "toc:db/journals/ijcritis/ijcritis9.bht:"
@article{DBLP:journals/ijcritis/ArboreF13, author = {Andrea Arbore and Vincenzo Antonio Fioriti}, title = {Topological protection from the next generation malware: a survey}, journal = {Int. J. Crit. Infrastructures}, volume = {9}, number = {1/2}, pages = {52--73}, year = {2013}, url = {https://doi.org/10.1504/IJCIS.2013.051603}, doi = {10.1504/IJCIS.2013.051603}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcritis/ArboreF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcritis/CasalicchioCCF13, author = {Emiliano Casalicchio and Marco Caselli and Alessio Coletta and Igor Nai Fovino}, title = {{DNS} as critical infrastructure, the energy system case study}, journal = {Int. J. Crit. Infrastructures}, volume = {9}, number = {1/2}, pages = {111--129}, year = {2013}, url = {https://doi.org/10.1504/IJCIS.2013.051605}, doi = {10.1504/IJCIS.2013.051605}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcritis/CasalicchioCCF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcritis/DigioiaFOP13, author = {Giusj Digioia and Chiara Foglietta and Gabriele Oliva and Stefano Panzieri}, title = {Aware online interdependency modelling via evidence theory}, journal = {Int. J. Crit. Infrastructures}, volume = {9}, number = {1/2}, pages = {74--92}, year = {2013}, url = {https://doi.org/10.1504/IJCIS.2013.051604}, doi = {10.1504/IJCIS.2013.051604}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcritis/DigioiaFOP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcritis/GayS13, author = {Leon F. Gay and Sunil K. Sinha}, title = {Resilience of civil infrastructure systems: literature review for improved asset management}, journal = {Int. J. Crit. Infrastructures}, volume = {9}, number = {4}, pages = {330--350}, year = {2013}, url = {https://doi.org/10.1504/IJCIS.2013.058172}, doi = {10.1504/IJCIS.2013.058172}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcritis/GayS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcritis/KatinaH13, author = {Polinpapilinho F. Katina and Patrick T. Hester}, title = {Systemic determination of infrastructure criticality}, journal = {Int. J. Crit. Infrastructures}, volume = {9}, number = {3}, pages = {211--225}, year = {2013}, url = {https://doi.org/10.1504/IJCIS.2013.054980}, doi = {10.1504/IJCIS.2013.054980}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcritis/KatinaH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcritis/KleinRUX13, author = {R{\"{u}}diger Klein and Stefan Rilling and Andrij Usov and Jingquan Xie}, title = {Using complex event processing for modelling and simulation of cyber-physical systems}, journal = {Int. J. Crit. Infrastructures}, volume = {9}, number = {1/2}, pages = {148--172}, year = {2013}, url = {https://doi.org/10.1504/IJCIS.2013.051610}, doi = {10.1504/IJCIS.2013.051610}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcritis/KleinRUX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcritis/KotzanikolaouTG13, author = {Panayiotis Kotzanikolaou and Marianthi Theoharidou and Dimitris Gritzalis}, title = {Assessing n-order dependencies between critical infrastructures}, journal = {Int. J. Crit. Infrastructures}, volume = {9}, number = {1/2}, pages = {93--110}, year = {2013}, url = {https://doi.org/10.1504/IJCIS.2013.051606}, doi = {10.1504/IJCIS.2013.051606}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcritis/KotzanikolaouTG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcritis/LabakaHLS13, author = {Leire Labaka and Josune Hernantes and Ana Laug{\'{e}} and Jose Mar{\'{\i}}a Sarriegi}, title = {Enhancing resilience: implementing resilience building policies against major industrial accidents}, journal = {Int. J. Crit. Infrastructures}, volume = {9}, number = {1/2}, pages = {130--147}, year = {2013}, url = {https://doi.org/10.1504/IJCIS.2013.051607}, doi = {10.1504/IJCIS.2013.051607}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcritis/LabakaHLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcritis/LamLST13, author = {Chi Yung Lam and Jiaying Lin and Mong Soon Sim and Kang Tai}, title = {Identifying vulnerabilities in critical infrastructures by network analysis}, journal = {Int. J. Crit. Infrastructures}, volume = {9}, number = {3}, pages = {190--210}, year = {2013}, url = {https://doi.org/10.1504/IJCIS.2013.054978}, doi = {10.1504/IJCIS.2013.054978}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcritis/LamLST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcritis/LuiijfBG13, author = {Eric A. M. Luiijf and Kim Besseling and Patrick De Graaf}, title = {Nineteen national cyber security strategies}, journal = {Int. J. Crit. Infrastructures}, volume = {9}, number = {1/2}, pages = {3--31}, year = {2013}, url = {https://doi.org/10.1504/IJCIS.2013.051608}, doi = {10.1504/IJCIS.2013.051608}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcritis/LuiijfBG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcritis/McEvoyW13, author = {Thomas Richard McEvoy and Stephen D. Wolthusen}, title = {Locating subverted processes using random packet comparison in {SCADA} systems}, journal = {Int. J. Crit. Infrastructures}, volume = {9}, number = {1/2}, pages = {32--51}, year = {2013}, url = {https://doi.org/10.1504/IJCIS.2013.051609}, doi = {10.1504/IJCIS.2013.051609}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcritis/McEvoyW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcritis/PetrenjLT13, author = {Boris Petrenj and Emanuele Lettieri and Paolo Trucco}, title = {Information sharing and collaboration for critical infrastructure resilience - a comprehensive review on barriers and emerging capabilities}, journal = {Int. J. Crit. Infrastructures}, volume = {9}, number = {4}, pages = {304--329}, year = {2013}, url = {https://doi.org/10.1504/IJCIS.2013.058171}, doi = {10.1504/IJCIS.2013.058171}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcritis/PetrenjLT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcritis/RobertMD13, author = {Benoit Robert and Luciano Morabito and C{\'{e}}dric Debernard}, title = {Simulation and anticipation of domino effects among critical infrastructures}, journal = {Int. J. Crit. Infrastructures}, volume = {9}, number = {4}, pages = {275--303}, year = {2013}, url = {https://doi.org/10.1504/IJCIS.2013.058170}, doi = {10.1504/IJCIS.2013.058170}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcritis/RobertMD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcritis/SchlakeM13, author = {Fari Schlake and Lamine Mili}, title = {Efficient network security as a strategic game}, journal = {Int. J. Crit. Infrastructures}, volume = {9}, number = {3}, pages = {243--273}, year = {2013}, url = {https://doi.org/10.1504/IJCIS.2013.054968}, doi = {10.1504/IJCIS.2013.054968}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcritis/SchlakeM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcritis/SinghSM13, author = {Arvind Singh and Krishan D. Srivastava and Jos{\'{e}} R. Mart{\'{\i}}}, title = {Reduction techniques in modelling critical infrastructures under the infrastructure interdependencies simulator framework}, journal = {Int. J. Crit. Infrastructures}, volume = {9}, number = {3}, pages = {173--189}, year = {2013}, url = {https://doi.org/10.1504/IJCIS.2013.054977}, doi = {10.1504/IJCIS.2013.054977}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcritis/SinghSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcritis/SreekalaGMSRI13, author = {R. Sreekala and N. Gopalakrishnan and K. Muthumani and K. Sathishkumar and G. V. Rama Rao and Nagesh R. Iyer}, title = {Seismic protection of critical infrastructures through innovative technologies}, journal = {Int. J. Crit. Infrastructures}, volume = {9}, number = {4}, pages = {351--367}, year = {2013}, url = {https://doi.org/10.1504/IJCIS.2013.058173}, doi = {10.1504/IJCIS.2013.058173}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcritis/SreekalaGMSRI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcritis/StamberEPWDLCBJ13, author = {Kevin L. Stamber and Mark A. Ehlen and Mark A. Pepple and Margaret E. Welk and Haoran Deng and Carol A. Lewis and Latissha Clark and James R. Bryant and Debbie Jasek}, title = {Comparative analysis of the transportation of select petrochemicals}, journal = {Int. J. Crit. Infrastructures}, volume = {9}, number = {3}, pages = {226--242}, year = {2013}, url = {https://doi.org/10.1504/IJCIS.2013.054981}, doi = {10.1504/IJCIS.2013.054981}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcritis/StamberEPWDLCBJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.