|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 23864 occurrences of 8654 keywords
|
|
|
Results
Found 38276 publication records. Showing 38275 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
57 | Phoebe Sengers, Kirsten Boehner, Shay David, Joseph Kaye |
Reflective design. |
Critical Computing |
2005 |
DBLP DOI BibTeX RDF |
reflection-in-practice, participatory design, value-sensitive design, critical design, reflective design, critical theory, critical technical practice, ludic design |
51 | Critical Platform Studies Group, Lilly Irani, Niloufar Salehi, Joyojeet Pal, Andrés Monroy-Hernández, Elizabeth F. Churchill, Sneha Narayan |
Patron or Poison?: Industry Funding of HCI Research. |
CSCW Companion |
2019 |
DBLP DOI BibTeX RDF |
|
49 | Dan Assaf |
Government Intervention in Information Infrastructure Protection. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
Critical information infrastructure protection, market failures, cyber security, government regulation |
45 | Felix Flentge, Uwe Beyer |
The ISE Metamodel for Critical Infrastructures. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
Infrastructure modeling, ISE metamodel, interdependencies |
45 | Salvatore D'Antonio, Francesco Oliviero, Roberto Setola |
High-Speed Intrusion Detection in Support of Critical Infrastructure Protection. |
CRITIS |
2006 |
DBLP DOI BibTeX RDF |
critical infrastructure protection (CIP), critical information infrastructure protection (CIIP), flow monitoring, intrusion detection, security management, SCADA |
45 | Peng-Jun Wan, Chih-Wei Yi |
Asymptotic critical transmission radius and critical neighbor number for k-connectivity in wireless ad hoc networks. |
MobiHoc |
2004 |
DBLP DOI BibTeX RDF |
asymptotic distribution, critical neighbor number, critical transmission radius, random geometric graph |
44 | Andy Dearden, Steve Walker, Leon Watts |
Choosing friends carefully: allies for critical computing. |
Critical Computing |
2005 |
DBLP DOI BibTeX RDF |
critical computing, social action, HCI |
42 | Tim M. Bull, E. J. Younger, Keith H. Bennett, Z. Luo |
Bylands: reverse engineering safety-critical systems. |
ICSM |
1995 |
DBLP DOI BibTeX RDF |
safety-critical software maintenance, Bylands, real-time existing code, high level design extraction, formal transformations, abstract representation, requirements analyses, very-high-level domain languages, real-time systems, reverse engineering, reverse engineering, software maintenance, systems analysis, safety-critical systems, high level languages, safety-critical software, temporal constraints |
41 | Jason K. Kopylec, Anita D'Amico, John R. Goodall |
Visualizing Cascading Failures in Critical Cyber Infrastructures. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
Cyber infrastructure, infrastructure dependencies, cascading failures, situational awareness, actor-network theory |
40 | Sang Hyuk Son, Robert C. Beckinger, David A. Baker |
DRDB: a distributed real-time database server for high-assurance time-critical applications. |
COMPSAC |
1997 |
DBLP DOI BibTeX RDF |
DRDB, distributed real time database server, high assurance time critical applications, critical tasks, scheduling decisions, concurrency control mechanisms, functional real time database server, operational platform, distributed real time database issues, distributed databases, timing constraints, data consistency, simulated environment, real time database systems, safety critical applications, operating environment |
39 | Scott Dynes, Eric Goetz, Michael Freeman |
Cyber Security: Are Economic Incentives Adequate? |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
economic incentives, Information security, government policy |
37 | Michael Carbin, Martin C. Rinard |
Automatically identifying critical input regions and code in applications. |
ISSTA |
2010 |
DBLP DOI BibTeX RDF |
critical code, critical input, forgiving code, forgiving input |
37 | Matej Stehlík |
Minimal Connected tau-Critical Hypergraphs. |
Graphs Comb. |
2006 |
DBLP DOI BibTeX RDF |
?-critical hypergraphs, Colour-critical graphs, t-stable hypergraphs |
37 | Hamed Okhravi, Adam Comella, Eric Robinson, Stephen Yannalfo, Peter Michaleas, Joshua W. Haines |
Creating a Cyber Moving Target for Critical Infrastructure Applications. |
Critical Infrastructure Protection |
2011 |
DBLP DOI BibTeX RDF |
|
37 | Yujue Wang, Carl Hauser |
An Evidence-Based Trust Assessment Framework for Critical Infrastructure Decision Making. |
Critical Infrastructure Protection |
2011 |
DBLP DOI BibTeX RDF |
|
37 | Dan Assaf |
Foreign Direct Investment in an Era of Increased Threats to Critical Infrastructures. |
Critical Infrastructure Protection |
2010 |
DBLP DOI BibTeX RDF |
|
37 | Ian Ellefsen, Sebastiaan H. von Solms |
Critical Information Infrastructure Protection in the Developing World. |
Critical Infrastructure Protection |
2010 |
DBLP DOI BibTeX RDF |
|
37 | Thomas Brandstetter, Konstantin Knorr, Ute Rosenbaum |
A Manufacturer-Specific Security Assessment Methodology for Critical Infrastructure Components. |
Critical Infrastructure Protection |
2010 |
DBLP DOI BibTeX RDF |
|
37 | Zaw Zaw Aung, Kenji Watanabe |
A Framework for Modeling Interdependencies in Japan's Critical Infrastructures. |
Critical Infrastructure Protection |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Vincenzo Masucci, Francesco Adinolfi, Paolo Servillo, Giovanni Dipoppa, Alberto Tofani |
Ontology-Based Critical Infrastructure Modeling and Simulation. |
Critical Infrastructure Protection |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Albert Nieuwenhuijs, Eric A. M. Luiijf, Marieke H. A. Klaver |
Modeling Dependencies In Critical Infrastructures. |
Critical Infrastructure Protection |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Scott Dynes |
Emergent Risks In Critical Infrastructures. |
Critical Infrastructure Protection |
2008 |
DBLP DOI BibTeX RDF |
|
37 | William J. Tolone, Seok-Won Lee, Wei-Ning Xiang, Joshua Blackwell, Cody Yeager, Andrew Schumpert, E. Wray Johnson |
An Integrated Methodology For Critical Infrastructure Modeling And Simulation. |
Critical Infrastructure Protection |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Amine Baïna, Anas Abou El Kalam, Yves Deswarte, Mohamed Kaâniche |
Collaborative Access Control For Critical Infrastructures. |
Critical Infrastructure Protection |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Dorsey Wilkin, Richard A. Raines, Paul D. Williams, Kenneth M. Hopkinson |
Cyberspace Policy For Critical Infrastructures. |
Critical Infrastructure Protection |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Jixing Wang |
Infinite Family from Each Vertex k-Critical Graph without Any Critical Edge. |
COCOA |
2009 |
DBLP DOI BibTeX RDF |
De-chromatic, Critical graph, Dirac conjecture, Composition, Decomposition |
35 | Nils Kalstad Svendsen, Stephen D. Wolthusen |
Multigraph Dependency Models for Heterogeneous Infrastructures. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
Infrastructure interdependencies, multigraph models, simulation |
35 | Henrik Christiansson, Eric A. M. Luiijf |
Creating a European SCADA Security Testbed. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
security testbed, risk assessment, SCADA systems |
35 | Robert K. Cunningham, Steven Cheung, Martin W. Fong, Ulf Lindqvist, David M. Nicol, Ronald Pawlowski, Eric Robinson, William H. Sanders, Sankalp Singh, Alfonso Valdes, Bradley Woodworth, Michael Zhivich |
Securing Current and Future Process Control Systems. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
secure platforms, vulnerability testing, access control, intrusion detection, Process control systems |
35 | Marcelo Masera, Igor Nai Fovino |
A Service-Oriented Approach for Assessing Infrastructure Security. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
systemof- systems, services, attacks, vulnerabilities, threats, Security assessment |
35 | Marie-Elena C. Kidd |
Ensuring critical event sequences in high consequence computer based systems as inspired by path expressions. |
ECBS |
1997 |
DBLP DOI BibTeX RDF |
critical event sequences, unstable operating environments, fault managemen, high consequence software, embedding checkpoints, update points, finite automata, path expressions, computer based systems, hardware failures, critical software |
34 | M. Aater Suleman, Onur Mutlu, Moinuddin K. Qureshi, Yale N. Patt |
Accelerating critical section execution with asymmetric multi-core architectures. |
ASPLOS |
2009 |
DBLP DOI BibTeX RDF |
heterogeneous cores, parallel programming, cmp, multi-core, locks, critical sections |
34 | Karthik Pattabiraman, Vinod Grover, Benjamin G. Zorn |
Samurai: protecting critical data in unsafe languages. |
EuroSys |
2008 |
DBLP DOI BibTeX RDF |
critical memory, error recovery, memory safety |
34 | Shiping Yang, Nan Sang, Guangze Xiong |
Safety Testing of Safety Critical Software Based on Critical Mission Duration. |
PRDC |
2004 |
DBLP DOI BibTeX RDF |
Safety Testing, Safety Critical System, Bayesian Analysis, Stopping Rules, Reliability Testing |
33 | Peter Dalsgård, Eva Eriksson, Lone Koefoed Hansen |
Rethinking information handling: designing for information offload. |
Critical Computing |
2005 |
DBLP DOI BibTeX RDF |
information offload, HCI, interaction design, information overload, critical design |
33 | Joanne M. Atlee, John A. McDermid |
Integrating requirements analysis and safety analysis. |
RE |
1995 |
DBLP DOI BibTeX RDF |
system safety requirements, design description, formal specification, systems analysis, requirements analysis, requirements specification, safety critical systems, safety-critical software, safety critical software, functional requirements, safety analysis, high level design |
33 | Wayne D. Gray, Philippe A. Palanque, Fabio Paternò |
Introduction to the special issue on interface issues and designs for safety-critical interactive systems: when there is no room for user error. |
ACM Trans. Comput. Hum. Interact. |
1999 |
DBLP DOI BibTeX RDF |
|
33 | Akio Doi, Satoshi Suzuki, Koji Koyamada, Shinji Sannakanishi |
Vortex flow visualization using tetrahedral cell subdivision. |
PG |
1997 |
DBLP DOI BibTeX RDF |
vortex flow visualization, tetrahedral cell subdivision, critical point searching technique, velocity vector, trilinear interpolation function, hexahedral cell, multiple critical points, linear interpolation function, numerical integration scheme, precise position calculation, Newton's method, vortices |
32 | Jill Slay, Michael Miller |
Lessons Learned from the Maroochy Water Breach. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
SCADA security, Maroochy Water Services breach |
32 | Rodrigo Chandia, Jesús González 0004, Tim Kilpatrick, Mauricio Papa, Sujeet Shenoi |
Security Strategies for SCADA Networks. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
SCADA networks, forensics, security services |
32 | Paul W. Oman, Matthew Phillips |
Intrusion Detection and Event Monitoring in SCADA Networks. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
SCADA networks, Intrusion detection, real-time monitoring |
32 | Jeffrey S. Simonoff, Carlos E. Restrepo, Rae Zimmerman, Zvia Naphtali |
Analysis of Electrical Power and Oil and Gas Pipeline Failures. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
Electrical power, oil and gas pipelines, count regression models, risk |
32 | Janica Edmonds, Mauricio Papa, Sujeet Shenoi |
Security Analysis of Multilayer SCADA Protocols. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
Multilayer protocols, Modbus TCP, formal methods, security analysis |
32 | Mark Blythe, Darren J. Reed, Peter C. Wright, Andrew F. Monk |
Critical perspectives on dependability: an older person's experience of assistive technology. |
Critical Computing |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Eevi E. Beck |
Learning management systems: the need for critical analyses. |
Critical Computing |
2005 |
DBLP DOI BibTeX RDF |
educational methods, education, accessibility, control, LMS, learning management systems, standardisation |
32 | Søren Pold |
The critical interface. |
Critical Computing |
2005 |
DBLP DOI BibTeX RDF |
interface criticism, HCI, art, aesthetics |
32 | Feruza Sattarova Yusufovna, Farkhod Alisherov Alisherovich, Minkyu Choi, Eun-suk Cho, Furkhat Tadjibayev Abdurashidovich, Tai-Hoon Kim |
Research on Critical Infrastructures and Critical Information Infrastructures. |
BLISS |
2009 |
DBLP DOI BibTeX RDF |
critical information infrastructure, energy, manufacture, health, icon, finance, law, critical infrastructure, people, problem, food |
32 | Stijn Eyerman, Lieven Eeckhout |
Modeling critical sections in Amdahl's law and its implications for multicore design. |
ISCA |
2010 |
DBLP DOI BibTeX RDF |
synchronization, critical sections, analytical performance modeling, Amdahl's law |
32 | Lindsay Grace |
Critical gameplay. |
Advances in Computer Entertainment Technology |
2009 |
DBLP DOI BibTeX RDF |
computer game art, critical gameplay, computer game theory |
32 | Thomas Grill, Margit Blauhut |
Design Patterns Applied in a User Interface Design (UID) Process for Safety Critical Environments (SCEs). |
USAB |
2008 |
DBLP DOI BibTeX RDF |
Safety critical environments, HCI, patterns |
32 | Tomoyuki Nieda, Alexander A. Pasko, Tosiyasu L. Kunii |
Detection and Classification of Critical Points for Linear Metamorphosis. |
CW |
2004 |
DBLP DOI BibTeX RDF |
classification, homotopy, critical points, Morse theory, Metamorphosis |
32 | Richard A. DeMillo, Hsin Pan, Eugene H. Spafford |
Critical Slicing for Software Fault Localization. |
ISSTA |
1996 |
DBLP DOI BibTeX RDF |
critical slicing, static program slicing, testing, debugging, failures, faults, fault localization, mutation analysis, dynamic program slicing |
31 | Jonathan White, Brajendra Panda |
Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Valeria Bonagura, Chiara Foglietta, Stefano Panzieri, Massimiliano Rossi 0005, Riccardo Santini, Monica Scannapieco, Luisa Franchina |
Modeling and Assessing the Impacts of Cyber Threats on Interdependent Critical Infrastructures. |
Critical Infrastructure Protection |
2023 |
DBLP DOI BibTeX RDF |
|
30 | Rajesh Kumar 0012, Siddhant Singh, Rohan Kela |
Analyzing Advanced Persistent Threats Using Game Theory: A Critical Literature Review. |
Critical Infrastructure Protection |
2021 |
DBLP DOI BibTeX RDF |
|
30 | Gemma Galdon Clavell, Victoria Peuvrelle |
Ethical Issues in Big Data Analytics for Time Critical Mobility Forecasting. |
Big Data Analytics for Time-Critical Mobility Forecasting |
2020 |
DBLP DOI BibTeX RDF |
|
30 | Rajesh Kumar 0012 |
A Model-Based Safety-Security Risk Analysis Framework for Interconnected Critical Infrastructures. |
Critical Infrastructure Protection |
2020 |
DBLP DOI BibTeX RDF |
|
30 | Tim Ellis, Michael Locasto, David Balenson |
Cyber State Requirements for Design and Validation of Trust in the Critical Transportation Infrastructure. |
Critical Infrastructure Protection |
2020 |
DBLP DOI BibTeX RDF |
|
30 | J. Peter Brady, Sergey Bratus, Sean W. Smith |
Dynamic Repair of Mission-Critical Applications with Runtime Snap-Ins. |
Critical Infrastructure Protection |
2019 |
DBLP DOI BibTeX RDF |
|
30 | Trevor MacLean, Robert Borrelli, Michael Haney |
Cyber Security Modeling of Non-Critical Nuclear Power Plant Digital Instrumentation. |
Critical Infrastructure Protection |
2019 |
DBLP DOI BibTeX RDF |
|
30 | Antonio Di Pietro, Stefano Panzieri, Andrea Gasparri |
Distributed Data Fusion for Situational Awareness in Critical Infrastructures with Link Failures. |
Critical Infrastructure Protection |
2017 |
DBLP DOI BibTeX RDF |
|
30 | Luca Galbusera, Georgios Giannopoulos |
Exploiting Web Ontologies for Automated Critical Infrastructure Data Retrieval. |
Critical Infrastructure Protection |
2017 |
DBLP DOI BibTeX RDF |
|
30 | Alessandro Niglia, Carlos Veraza |
Building Resilience Through Social Media After an Attack on Critical Infrastructure. |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Francesco Cavallaro, Andrea Chiappetta, Massimiliano De Santis, Anna Pinnarelli |
Critical Infrastructure Protection: Smart Grids. |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Edoardo Camilli |
OSINT, Big Data & Critical Infrastructures Protection (CIP). |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Anke Schmidt-Felzmann |
"Sweden Under Attack!" Lessons from Past Incidents for Coping with a Comprehensive Synchronized Attack on Critical Energy and Information Infrastructure. |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Antonia Colibasanu |
NATO's Frontier Critical Infrastructure Protection Buildup - Discussion on the Romanian Energy Sector Protection Challenges. |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Gianluca Baldassarre |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges. |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Gianni Cuozzo |
Critical Infrastructure Cyber-Attack Through Firmware Exploitation. |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges |
2016 |
DBLP DOI BibTeX RDF |
|
30 | George Stergiopoulos, Efstratios Vasilellis, Georgia Lykou, Panayiotis Kotzanikolaou, Dimitris Gritzalis |
Classification and Comparison of Critical Infrastructure Protection Tools. |
Critical Infrastructure Protection |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Michael Quigg, Juan Lopez Jr., Mason Rice, Michael R. Grimaila, Benjamin W. P. Ramsey |
Cyberspace and Organizational Structure: An Analysis of the Critical Infrastructure Environment. |
Critical Infrastructure Protection |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Carol J. Romanowski, Rajendra K. Raj, Jennifer Schneider 0001, Sumita Mishra, Bernard Brooks, Jessica Pardee, Bharat Bhole, Nikolaus Robalino |
A Multidisciplinary Predictive Model for Managing Critical Infrastructure Disruptions. |
Critical Infrastructure Protection |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Bernhard Schneidhofer, Stephen D. Wolthusen |
Multigraph Critical Infrastructure Model. |
Critical Infrastructure Protection |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Christine Izuakor, Richard White |
Critical Infrastructure Asset Identification: Policy, Methodology and Gap Analysis. |
Critical Infrastructure Protection |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Vicenç Puig, Teresa Escobet, Ramon Sarrate, Joseba Quevedo |
Fault Diagnosis and Fault Tolerant Control in Critical Infrastructure Systems. |
Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Georgios Ellinas, Christos G. Panayiotou, Elias Kyriakides, Marios M. Polycarpou |
Critical Infrastructure Systems: Basic Principles of Monitoring, Control, and Security. |
Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Chiara Foglietta, Stefano Panzieri, Federica Pascucci |
Algorithms and Tools for Risk/Impact Evaluation in Critical Infrastructures. |
Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Cesare Alippi, Romolo Camplani, Antonio Marullo, Manuel Roveri |
Algorithms and Tools for Intelligent Monitoring of Critical Infrastructure Systems. |
Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Mietek A. Brdys |
Algorithms and Tools for Intelligent Control of Critical Infrastructure Systems. |
Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Attila Vidács, Rolland Vida |
Wireless Sensor Network Based Technologies for Critical Infrastructure Systems. |
Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Milan Bigovic, Ana Rakocevic |
Challenges in Defining Critical Infrastructure in Montenegro. |
Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Farshad Mohammad-Avvali, Alessandro Niglia |
Future Activities in Critical Energy Infrastructure Protection - Recommendations. |
The Protection of Critical Energy Infrastructure Against Emerging Security Challenges |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Samir Agic, Edin Garaplija |
Risk Management of Terrorist Attacks in the Tunnels as Critical Points of Corridor 5c Infrastructure - Trans-European Road Network Through Bosnia and Herzegovina. |
Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Jaka Vadnjal |
Corruption: From Generally Accepted Business Practice to Serious Threat to Critical Infrastructure Protection. |
Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Riccardo Dugulin |
The Potential Cooperation Between NATO and Private Risk Management Companies in the Protection of Critical Energy Infrastructure. |
The Protection of Critical Energy Infrastructure Against Emerging Security Challenges |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Ferdinand Odzakov, Metodija Dojcinovski |
Contemporary Aspects in Critical Infrastructure Protection and Combating Terrorism. |
Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Milan Tarman |
Security Vetting in Relation to the Critical Infrastructure. |
Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Zoran Kekovic, Vladimir Ninkovic |
Towards a Resilient Critical Infrastructure System against the Risk of Terrorism. |
Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Kutjim Proseku |
The Critical Energy Infrastructure Protection Against Emerging Security Threats. |
The Protection of Critical Energy Infrastructure Against Emerging Security Challenges |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Metodi Hadji-Janev |
Changing the Approach to Energy Security: Critical Energy Infrastructure Protection in Context. |
The Protection of Critical Energy Infrastructure Against Emerging Security Challenges |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Mile Sikman, Nevenko Vranjes |
Terrorist Threats to Critical Infrastructure in BiH and Protection Measures. |
Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Metodi Hadji-Janev |
Protecting Critical Information Infrastructure from Terrorist Attacks in South East Europe: How Real is the Threat? |
Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Mesut Hakki Casin |
Critical Infrastructure Protection (CIP) and Southern Gas Corridor Policies. |
The Protection of Critical Energy Infrastructure Against Emerging Security Challenges |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Sandro Bologna, Alessandro Lazari, Stefano Mele |
Improving Critical Infrastructure Protection and Resilience against Terrorism Cyber Threats. |
Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Stojan Slaveski, Oliver Bakreski |
Security of Classified Information as Part of the National Critical Infrastructure Protection: Macedonian Experience. |
Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Jadran Perinic, Robert Mikac |
Protection of the Critical Infrastructure from Terrorism: Case Study of the Republic of Croatia. |
Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Alessandro Niglia |
Critical Infrastructure Protection (CEIP) with a Focus on Energy Security. |
The Protection of Critical Energy Infrastructure Against Emerging Security Challenges |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Christopher W. Badenhop, Jonathan D. Fuller, Joseph Hall, Benjamin W. P. Ramsey, Mason Rice |
Evaluating ITU-T G.9959 Based Wireless Systems Used in Critical Infrastructure Assets. |
Critical Infrastructure Protection |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Somya Joshi, Teresa Cerratto Pargman |
In search of fairness: critical design alternatives for sustainability. |
Aarhus Conference on Critical Alternatives |
2015 |
DBLP BibTeX RDF |
|
30 | Erik Grönvall, Nervo Verdezoto, Naveen Bagalkot, Tomas Sokoler |
Concordance: a critical participatory alternative in healthcare IT. |
Aarhus Conference on Critical Alternatives |
2015 |
DBLP BibTeX RDF |
|
Displaying result #1 - #100 of 38275 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|