Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijcip/ijcip28.bht:"
@article{DBLP:journals/ijcip/Cavalieri20, author = {Francesco Cavalieri}, title = {Seismic risk assessment of natural gas networks with steady-state flow computation}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {28}, pages = {100339}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100339}, doi = {10.1016/J.IJCIP.2020.100339}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/Cavalieri20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/FaramondiOS20, author = {Luca Faramondi and Gabriele Oliva and Roberto Setola}, title = {Multi-criteria node criticality assessment framework for critical infrastructure networks}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {28}, pages = {100338}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100338}, doi = {10.1016/J.IJCIP.2020.100338}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/FaramondiOS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KraidiSMB20, author = {Layth Kraidi and Raj Shah and Wilfred Matipa and Fiona Borthwick}, title = {Using stakeholders' judgement and fuzzy logic theory to analyze the risk influencing factors in oil and gas pipeline projects: Case study in Iraq, Stage {II}}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {28}, pages = {100337}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100337}, doi = {10.1016/J.IJCIP.2020.100337}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/KraidiSMB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/LoLHCT20, author = {Huai{-}Wei Lo and James Jiann{-}Haw Liou and Chun{-}Nen Huang and Yen{-}Ching Chuang and Gwo{-}Hshiung Tzeng}, title = {A new soft computing approach for analyzing the influential relationships of critical infrastructures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {28}, pages = {100336}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2019.100336}, doi = {10.1016/J.IJCIP.2019.100336}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/LoLHCT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/PetersenLFSLTB20, author = {Laura Petersen and Emma Lundin and Laure Fallou and Johan Sj{\"{o}}str{\"{o}}m and David Lange and Rui Teixeira and Alexandre Bonavita}, title = {Resilience for whom? The general public's tolerance levels as {CI} resilience criteria}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {28}, pages = {100340}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100340}, doi = {10.1016/J.IJCIP.2020.100340}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/PetersenLFSLTB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ShresthaJNR20, author = {Manish Shrestha and Christian Johansen and Josef Noll and Davide Roverso}, title = {A Methodology for Security Classification applied to Smart Grid Infrastructures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {28}, pages = {100342}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100342}, doi = {10.1016/J.IJCIP.2020.100342}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/ShresthaJNR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Strous20, author = {Leon Strous}, title = {{IJCIP} Editorial March 2020 - Volume 28}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {28}, pages = {100343}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100343}, doi = {10.1016/J.IJCIP.2020.100343}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/Strous20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/UmerMJA20, author = {Muhammad Azmi Umer and Aditya Mathur and Khurum Nazir Junejo and Sridhar Adepu}, title = {Generating invariants using design and data-centric approaches for distributed attack detection}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {28}, pages = {100341}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100341}, doi = {10.1016/J.IJCIP.2020.100341}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/UmerMJA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.