Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijcip/ijcip7.bht:"
@article{DBLP:journals/ijcip/ArmandoMV14, author = {Alessandro Armando and Alessio Merlo and Luca Verderame}, title = {Security considerations related to the use of mobile devices in the operation of critical infrastructures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {4}, pages = {247--256}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.10.002}, doi = {10.1016/J.IJCIP.2014.10.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ArmandoMV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/BodenheimBDM14, author = {Roland Bodenheim and Jonathan Butts and Stephen Dunlap and Barry E. Mullins}, title = {Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {2}, pages = {114--123}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.03.001}, doi = {10.1016/J.IJCIP.2014.03.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/BodenheimBDM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/CoppolinoDR14, author = {Luigi Coppolino and Salvatore D'Antonio and Luigi Romano}, title = {Exposing vulnerabilities in electric power grids: An experimental approach}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {1}, pages = {51--60}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.01.003}, doi = {10.1016/J.IJCIP.2014.01.003}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/CoppolinoDR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/FarleyW14, author = {Ryan Farley and Xinyuan Wang}, title = {Exploiting VoIP softphone vulnerabilities to disable host computers: Attacks and mitigation}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {3}, pages = {141--154}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.07.001}, doi = {10.1016/J.IJCIP.2014.07.001}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/FarleyW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/George14, author = {Richard George}, title = {Observations from a Cyber Tabletop}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {2}, pages = {112--113}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.04.004}, doi = {10.1016/J.IJCIP.2014.04.004}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/George14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/GianiBP14, author = {Annarita Giani and Russell Bent and Feng Pan}, title = {Phasor measurement unit selection for unobservable electric power data integrity attack detection}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {3}, pages = {155--164}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.06.001}, doi = {10.1016/J.IJCIP.2014.06.001}, timestamp = {Mon, 18 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/GianiBP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Hagerott14, author = {Mark Hagerott}, title = {Stuxnet and the vital role of critical infrastructure operators and engineers}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {4}, pages = {244--246}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.09.001}, doi = {10.1016/J.IJCIP.2014.09.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Hagerott14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/JaradatK14, author = {Ra'ed M. Jaradat and Charles B. Keating}, title = {Fragility of oil as a critical infrastructure problem}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {2}, pages = {86--99}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.04.005}, doi = {10.1016/J.IJCIP.2014.04.005}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/JaradatK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KatinaPBH14, author = {Polinpapilinho F. Katina and C. Ariel Pinto and Joseph M. Bradley and Patrick T. Hester}, title = {Interdependency-induced risk with applications to healthcare}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {1}, pages = {12--26}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.01.005}, doi = {10.1016/J.IJCIP.2014.01.005}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/KatinaPBH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KrotofilCLG14, author = {Marina Krotofil and Alvaro A. C{\'{a}}rdenas and Jason Larsen and Dieter Gollmann}, title = {Vulnerabilities of cyber-physical systems to stale data - Determining the optimal time to launch attacks}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {4}, pages = {213--232}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.10.003}, doi = {10.1016/J.IJCIP.2014.10.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/KrotofilCLG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Luiijf14, author = {Eric A. M. Luiijf}, title = {Are we in love with cyber insecurity?}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {3}, pages = {165--166}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.07.002}, doi = {10.1016/J.IJCIP.2014.07.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Luiijf14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Nunes-VazL14, author = {Rick Nunes{-}Vaz and Steven Lord}, title = {Designing physical security for complex infrastructures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {3}, pages = {178--192}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.06.003}, doi = {10.1016/J.IJCIP.2014.06.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Nunes-VazL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RanaS14, author = {Antonia Rana and Luigi Sportiello}, title = {Implementation of security and privacy in ePassports and the extended access control infrastructure}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {4}, pages = {233--243}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.10.001}, doi = {10.1016/J.IJCIP.2014.10.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/RanaS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RowlandRS14, author = {Jill Rowland and Mason Rice and Sujeet Shenoi}, title = {The anatomy of a cyber power}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {1}, pages = {3--11}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.01.001}, doi = {10.1016/J.IJCIP.2014.01.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/RowlandRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RowlandRS14a, author = {Jill Rowland and Mason Rice and Sujeet Shenoi}, title = {Whither cyberpower?}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {2}, pages = {124--137}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.04.001}, doi = {10.1016/J.IJCIP.2014.04.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/RowlandRS14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/SchuettBD14, author = {Carl Schuett and Jonathan Butts and Stephen Dunlap}, title = {An evaluation of modification attacks on programmable logic controllers}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {1}, pages = {61--68}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.01.004}, doi = {10.1016/J.IJCIP.2014.01.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/SchuettBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi14, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {1}, pages = {1--2}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.02.002}, doi = {10.1016/J.IJCIP.2014.02.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi14a, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {2}, pages = {69--70}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.04.006}, doi = {10.1016/J.IJCIP.2014.04.006}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi14b, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {3}, pages = {139--140}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.07.004}, doi = {10.1016/J.IJCIP.2014.07.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi14b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi14c, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {4}, pages = {211--212}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.10.004}, doi = {10.1016/J.IJCIP.2014.10.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi14c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Siler-EvansHSLT14, author = {Kyle Siler{-}Evans and Alex Hanson and Cecily Sunday and Nathan Leonard and Michele Tumminello}, title = {Analysis of pipeline accidents in the United States from 1968 to 2009}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {4}, pages = {257--269}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.09.002}, doi = {10.1016/J.IJCIP.2014.09.002}, timestamp = {Mon, 01 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/Siler-EvansHSLT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/SinghGO14, author = {Abhishek Narain Singh and M. P. Gupta and Amitabh Ojha}, title = {Identifying critical infrastructure sectors and their dependencies: An Indian scenario}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {2}, pages = {71--85}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.04.003}, doi = {10.1016/J.IJCIP.2014.04.003}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/SinghGO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Smith14, author = {Kendal Smith}, title = {Designing flexible curricula to enhance critical infrastructure security and resilience}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {1}, pages = {48--50}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.01.002}, doi = {10.1016/J.IJCIP.2014.01.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Smith14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/TuncerL14, author = {Necibe Tuncer and Trang T. Le}, title = {Effect of air travel on the spread of an avian influenza pandemic to the United States}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {1}, pages = {27--47}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.02.001}, doi = {10.1016/J.IJCIP.2014.02.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/TuncerL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/WardKLC14, author = {David Ward and Naouma Kourti and Alessandro Lazari and Piotr Cofta}, title = {Trust building and the European Reference Network for Critical Infrastructure Protection community}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {3}, pages = {193--210}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.07.003}, doi = {10.1016/J.IJCIP.2014.07.003}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/WardKLC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/WhiteBC14, author = {Richard White and Terrance E. Boult and Edward Chow}, title = {A computational asset vulnerability model for the strategic protection of the critical infrastructure}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {3}, pages = {167--177}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.06.002}, doi = {10.1016/J.IJCIP.2014.06.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/WhiteBC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Yates14, author = {Athol Yates}, title = {A framework for studying mortality arising from critical infrastructure loss}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {2}, pages = {100--111}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.04.002}, doi = {10.1016/J.IJCIP.2014.04.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Yates14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.