Search dblp for Publications

export results for "toc:db/journals/ijcip/ijcip7.bht:"

 download as .bib file

@article{DBLP:journals/ijcip/ArmandoMV14,
  author       = {Alessandro Armando and
                  Alessio Merlo and
                  Luca Verderame},
  title        = {Security considerations related to the use of mobile devices in the
                  operation of critical infrastructures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {4},
  pages        = {247--256},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.10.002},
  doi          = {10.1016/J.IJCIP.2014.10.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ArmandoMV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/BodenheimBDM14,
  author       = {Roland Bodenheim and
                  Jonathan Butts and
                  Stephen Dunlap and
                  Barry E. Mullins},
  title        = {Evaluation of the ability of the Shodan search engine to identify
                  Internet-facing industrial control devices},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {2},
  pages        = {114--123},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.03.001},
  doi          = {10.1016/J.IJCIP.2014.03.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/BodenheimBDM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/CoppolinoDR14,
  author       = {Luigi Coppolino and
                  Salvatore D'Antonio and
                  Luigi Romano},
  title        = {Exposing vulnerabilities in electric power grids: An experimental
                  approach},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {1},
  pages        = {51--60},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.01.003},
  doi          = {10.1016/J.IJCIP.2014.01.003},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/CoppolinoDR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/FarleyW14,
  author       = {Ryan Farley and
                  Xinyuan Wang},
  title        = {Exploiting VoIP softphone vulnerabilities to disable host computers:
                  Attacks and mitigation},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {3},
  pages        = {141--154},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.07.001},
  doi          = {10.1016/J.IJCIP.2014.07.001},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/FarleyW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/George14,
  author       = {Richard George},
  title        = {Observations from a Cyber Tabletop},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {2},
  pages        = {112--113},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.04.004},
  doi          = {10.1016/J.IJCIP.2014.04.004},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/George14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/GianiBP14,
  author       = {Annarita Giani and
                  Russell Bent and
                  Feng Pan},
  title        = {Phasor measurement unit selection for unobservable electric power
                  data integrity attack detection},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {3},
  pages        = {155--164},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.06.001},
  doi          = {10.1016/J.IJCIP.2014.06.001},
  timestamp    = {Mon, 18 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/GianiBP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Hagerott14,
  author       = {Mark Hagerott},
  title        = {Stuxnet and the vital role of critical infrastructure operators and
                  engineers},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {4},
  pages        = {244--246},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.09.001},
  doi          = {10.1016/J.IJCIP.2014.09.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Hagerott14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/JaradatK14,
  author       = {Ra'ed M. Jaradat and
                  Charles B. Keating},
  title        = {Fragility of oil as a critical infrastructure problem},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {2},
  pages        = {86--99},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.04.005},
  doi          = {10.1016/J.IJCIP.2014.04.005},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/JaradatK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KatinaPBH14,
  author       = {Polinpapilinho F. Katina and
                  C. Ariel Pinto and
                  Joseph M. Bradley and
                  Patrick T. Hester},
  title        = {Interdependency-induced risk with applications to healthcare},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {1},
  pages        = {12--26},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.01.005},
  doi          = {10.1016/J.IJCIP.2014.01.005},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/KatinaPBH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KrotofilCLG14,
  author       = {Marina Krotofil and
                  Alvaro A. C{\'{a}}rdenas and
                  Jason Larsen and
                  Dieter Gollmann},
  title        = {Vulnerabilities of cyber-physical systems to stale data - Determining
                  the optimal time to launch attacks},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {4},
  pages        = {213--232},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.10.003},
  doi          = {10.1016/J.IJCIP.2014.10.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/KrotofilCLG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Luiijf14,
  author       = {Eric A. M. Luiijf},
  title        = {Are we in love with cyber insecurity?},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {3},
  pages        = {165--166},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.07.002},
  doi          = {10.1016/J.IJCIP.2014.07.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Luiijf14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Nunes-VazL14,
  author       = {Rick Nunes{-}Vaz and
                  Steven Lord},
  title        = {Designing physical security for complex infrastructures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {3},
  pages        = {178--192},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.06.003},
  doi          = {10.1016/J.IJCIP.2014.06.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Nunes-VazL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RanaS14,
  author       = {Antonia Rana and
                  Luigi Sportiello},
  title        = {Implementation of security and privacy in ePassports and the extended
                  access control infrastructure},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {4},
  pages        = {233--243},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.10.001},
  doi          = {10.1016/J.IJCIP.2014.10.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/RanaS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RowlandRS14,
  author       = {Jill Rowland and
                  Mason Rice and
                  Sujeet Shenoi},
  title        = {The anatomy of a cyber power},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {1},
  pages        = {3--11},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.01.001},
  doi          = {10.1016/J.IJCIP.2014.01.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/RowlandRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RowlandRS14a,
  author       = {Jill Rowland and
                  Mason Rice and
                  Sujeet Shenoi},
  title        = {Whither cyberpower?},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {2},
  pages        = {124--137},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.04.001},
  doi          = {10.1016/J.IJCIP.2014.04.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/RowlandRS14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SchuettBD14,
  author       = {Carl Schuett and
                  Jonathan Butts and
                  Stephen Dunlap},
  title        = {An evaluation of modification attacks on programmable logic controllers},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {1},
  pages        = {61--68},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.01.004},
  doi          = {10.1016/J.IJCIP.2014.01.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/SchuettBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi14,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {1},
  pages        = {1--2},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.02.002},
  doi          = {10.1016/J.IJCIP.2014.02.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi14a,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {2},
  pages        = {69--70},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.04.006},
  doi          = {10.1016/J.IJCIP.2014.04.006},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi14b,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {3},
  pages        = {139--140},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.07.004},
  doi          = {10.1016/J.IJCIP.2014.07.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi14b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi14c,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {4},
  pages        = {211--212},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.10.004},
  doi          = {10.1016/J.IJCIP.2014.10.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi14c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Siler-EvansHSLT14,
  author       = {Kyle Siler{-}Evans and
                  Alex Hanson and
                  Cecily Sunday and
                  Nathan Leonard and
                  Michele Tumminello},
  title        = {Analysis of pipeline accidents in the United States from 1968 to 2009},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {4},
  pages        = {257--269},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.09.002},
  doi          = {10.1016/J.IJCIP.2014.09.002},
  timestamp    = {Mon, 01 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/Siler-EvansHSLT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SinghGO14,
  author       = {Abhishek Narain Singh and
                  M. P. Gupta and
                  Amitabh Ojha},
  title        = {Identifying critical infrastructure sectors and their dependencies:
                  An Indian scenario},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {2},
  pages        = {71--85},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.04.003},
  doi          = {10.1016/J.IJCIP.2014.04.003},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/SinghGO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Smith14,
  author       = {Kendal Smith},
  title        = {Designing flexible curricula to enhance critical infrastructure security
                  and resilience},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {1},
  pages        = {48--50},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.01.002},
  doi          = {10.1016/J.IJCIP.2014.01.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Smith14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/TuncerL14,
  author       = {Necibe Tuncer and
                  Trang T. Le},
  title        = {Effect of air travel on the spread of an avian influenza pandemic
                  to the United States},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {1},
  pages        = {27--47},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.02.001},
  doi          = {10.1016/J.IJCIP.2014.02.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/TuncerL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/WardKLC14,
  author       = {David Ward and
                  Naouma Kourti and
                  Alessandro Lazari and
                  Piotr Cofta},
  title        = {Trust building and the European Reference Network for Critical Infrastructure
                  Protection community},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {3},
  pages        = {193--210},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.07.003},
  doi          = {10.1016/J.IJCIP.2014.07.003},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/WardKLC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/WhiteBC14,
  author       = {Richard White and
                  Terrance E. Boult and
                  Edward Chow},
  title        = {A computational asset vulnerability model for the strategic protection
                  of the critical infrastructure},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {3},
  pages        = {167--177},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.06.002},
  doi          = {10.1016/J.IJCIP.2014.06.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/WhiteBC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Yates14,
  author       = {Athol Yates},
  title        = {A framework for studying mortality arising from critical infrastructure
                  loss},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {2},
  pages        = {100--111},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.04.002},
  doi          = {10.1016/J.IJCIP.2014.04.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Yates14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics