![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
International Journal of Critical Infrastructure Protection, Volume 15
Volume 15, December 2016
- Sujeet Shenoi:
Editorial. 1-2
- Béla Genge, Piroska Haller
, István Kiss:
A framework for designing resilient distributed intrusion detection systems for critical infrastructures. 3-11 - Stephen Dunlap, Jonathan Butts, Juan Lopez Jr., Mason Rice, Barry E. Mullins:
Using timing-based side channels for anomaly detection in industrial control systems. 12-26 - Claudio Urrea
, Claudio Morales
, John Kern:
Implementation of error detection and correction in the Modbus-RTU serial protocol. 27-37
- Chris Bronk:
Imagining the limits of complexity in computerized critical infrastructure. 38-39
- Busyairah Syd Ali
:
System specifications for developing an Automatic Dependent Surveillance-Broadcast (ADS-B) monitoring system. 40-46 - Bilge Karabacak
, Sevgi Özkan Yildirim
, Nazife Baykal:
A vulnerability-driven cyber security maturity model for measuring national critical infrastructure protection preparedness. 47-59
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.