Search dblp for Publications

export results for "toc:db/journals/ijcritis/ijcritis9.bht:"

 download as .bib file

@article{DBLP:journals/ijcritis/ArboreF13,
  author       = {Andrea Arbore and
                  Vincenzo Antonio Fioriti},
  title        = {Topological protection from the next generation malware: a survey},
  journal      = {Int. J. Crit. Infrastructures},
  volume       = {9},
  number       = {1/2},
  pages        = {52--73},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJCIS.2013.051603},
  doi          = {10.1504/IJCIS.2013.051603},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcritis/ArboreF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcritis/CasalicchioCCF13,
  author       = {Emiliano Casalicchio and
                  Marco Caselli and
                  Alessio Coletta and
                  Igor Nai Fovino},
  title        = {{DNS} as critical infrastructure, the energy system case study},
  journal      = {Int. J. Crit. Infrastructures},
  volume       = {9},
  number       = {1/2},
  pages        = {111--129},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJCIS.2013.051605},
  doi          = {10.1504/IJCIS.2013.051605},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcritis/CasalicchioCCF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcritis/DigioiaFOP13,
  author       = {Giusj Digioia and
                  Chiara Foglietta and
                  Gabriele Oliva and
                  Stefano Panzieri},
  title        = {Aware online interdependency modelling via evidence theory},
  journal      = {Int. J. Crit. Infrastructures},
  volume       = {9},
  number       = {1/2},
  pages        = {74--92},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJCIS.2013.051604},
  doi          = {10.1504/IJCIS.2013.051604},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcritis/DigioiaFOP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcritis/GayS13,
  author       = {Leon F. Gay and
                  Sunil K. Sinha},
  title        = {Resilience of civil infrastructure systems: literature review for
                  improved asset management},
  journal      = {Int. J. Crit. Infrastructures},
  volume       = {9},
  number       = {4},
  pages        = {330--350},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJCIS.2013.058172},
  doi          = {10.1504/IJCIS.2013.058172},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcritis/GayS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcritis/KatinaH13,
  author       = {Polinpapilinho F. Katina and
                  Patrick T. Hester},
  title        = {Systemic determination of infrastructure criticality},
  journal      = {Int. J. Crit. Infrastructures},
  volume       = {9},
  number       = {3},
  pages        = {211--225},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJCIS.2013.054980},
  doi          = {10.1504/IJCIS.2013.054980},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcritis/KatinaH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcritis/KleinRUX13,
  author       = {R{\"{u}}diger Klein and
                  Stefan Rilling and
                  Andrij Usov and
                  Jingquan Xie},
  title        = {Using complex event processing for modelling and simulation of cyber-physical
                  systems},
  journal      = {Int. J. Crit. Infrastructures},
  volume       = {9},
  number       = {1/2},
  pages        = {148--172},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJCIS.2013.051610},
  doi          = {10.1504/IJCIS.2013.051610},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcritis/KleinRUX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcritis/KotzanikolaouTG13,
  author       = {Panayiotis Kotzanikolaou and
                  Marianthi Theoharidou and
                  Dimitris Gritzalis},
  title        = {Assessing n-order dependencies between critical infrastructures},
  journal      = {Int. J. Crit. Infrastructures},
  volume       = {9},
  number       = {1/2},
  pages        = {93--110},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJCIS.2013.051606},
  doi          = {10.1504/IJCIS.2013.051606},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcritis/KotzanikolaouTG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcritis/LabakaHLS13,
  author       = {Leire Labaka and
                  Josune Hernantes and
                  Ana Laug{\'{e}} and
                  Jose Mar{\'{\i}}a Sarriegi},
  title        = {Enhancing resilience: implementing resilience building policies against
                  major industrial accidents},
  journal      = {Int. J. Crit. Infrastructures},
  volume       = {9},
  number       = {1/2},
  pages        = {130--147},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJCIS.2013.051607},
  doi          = {10.1504/IJCIS.2013.051607},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcritis/LabakaHLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcritis/LamLST13,
  author       = {Chi Yung Lam and
                  Jiaying Lin and
                  Mong Soon Sim and
                  Kang Tai},
  title        = {Identifying vulnerabilities in critical infrastructures by network
                  analysis},
  journal      = {Int. J. Crit. Infrastructures},
  volume       = {9},
  number       = {3},
  pages        = {190--210},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJCIS.2013.054978},
  doi          = {10.1504/IJCIS.2013.054978},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcritis/LamLST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcritis/LuiijfBG13,
  author       = {Eric A. M. Luiijf and
                  Kim Besseling and
                  Patrick De Graaf},
  title        = {Nineteen national cyber security strategies},
  journal      = {Int. J. Crit. Infrastructures},
  volume       = {9},
  number       = {1/2},
  pages        = {3--31},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJCIS.2013.051608},
  doi          = {10.1504/IJCIS.2013.051608},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcritis/LuiijfBG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcritis/McEvoyW13,
  author       = {Thomas Richard McEvoy and
                  Stephen D. Wolthusen},
  title        = {Locating subverted processes using random packet comparison in {SCADA}
                  systems},
  journal      = {Int. J. Crit. Infrastructures},
  volume       = {9},
  number       = {1/2},
  pages        = {32--51},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJCIS.2013.051609},
  doi          = {10.1504/IJCIS.2013.051609},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcritis/McEvoyW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcritis/PetrenjLT13,
  author       = {Boris Petrenj and
                  Emanuele Lettieri and
                  Paolo Trucco},
  title        = {Information sharing and collaboration for critical infrastructure
                  resilience - a comprehensive review on barriers and emerging capabilities},
  journal      = {Int. J. Crit. Infrastructures},
  volume       = {9},
  number       = {4},
  pages        = {304--329},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJCIS.2013.058171},
  doi          = {10.1504/IJCIS.2013.058171},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcritis/PetrenjLT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcritis/RobertMD13,
  author       = {Benoit Robert and
                  Luciano Morabito and
                  C{\'{e}}dric Debernard},
  title        = {Simulation and anticipation of domino effects among critical infrastructures},
  journal      = {Int. J. Crit. Infrastructures},
  volume       = {9},
  number       = {4},
  pages        = {275--303},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJCIS.2013.058170},
  doi          = {10.1504/IJCIS.2013.058170},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcritis/RobertMD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcritis/SchlakeM13,
  author       = {Fari Schlake and
                  Lamine Mili},
  title        = {Efficient network security as a strategic game},
  journal      = {Int. J. Crit. Infrastructures},
  volume       = {9},
  number       = {3},
  pages        = {243--273},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJCIS.2013.054968},
  doi          = {10.1504/IJCIS.2013.054968},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcritis/SchlakeM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcritis/SinghSM13,
  author       = {Arvind Singh and
                  Krishan D. Srivastava and
                  Jos{\'{e}} R. Mart{\'{\i}}},
  title        = {Reduction techniques in modelling critical infrastructures under the
                  infrastructure interdependencies simulator framework},
  journal      = {Int. J. Crit. Infrastructures},
  volume       = {9},
  number       = {3},
  pages        = {173--189},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJCIS.2013.054977},
  doi          = {10.1504/IJCIS.2013.054977},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcritis/SinghSM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcritis/SreekalaGMSRI13,
  author       = {R. Sreekala and
                  N. Gopalakrishnan and
                  K. Muthumani and
                  K. Sathishkumar and
                  G. V. Rama Rao and
                  Nagesh R. Iyer},
  title        = {Seismic protection of critical infrastructures through innovative
                  technologies},
  journal      = {Int. J. Crit. Infrastructures},
  volume       = {9},
  number       = {4},
  pages        = {351--367},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJCIS.2013.058173},
  doi          = {10.1504/IJCIS.2013.058173},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcritis/SreekalaGMSRI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcritis/StamberEPWDLCBJ13,
  author       = {Kevin L. Stamber and
                  Mark A. Ehlen and
                  Mark A. Pepple and
                  Margaret E. Welk and
                  Haoran Deng and
                  Carol A. Lewis and
                  Latissha Clark and
                  James R. Bryant and
                  Debbie Jasek},
  title        = {Comparative analysis of the transportation of select petrochemicals},
  journal      = {Int. J. Crit. Infrastructures},
  volume       = {9},
  number       = {3},
  pages        = {226--242},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJCIS.2013.054981},
  doi          = {10.1504/IJCIS.2013.054981},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcritis/StamberEPWDLCBJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}