Search dblp for Publications

export results for "toc:db/journals/ijcip/ijcip20.bht:"

 download as .bib file

@article{DBLP:journals/ijcip/CherifiH18,
  author       = {Tarek Cherifi and
                  Latifa Hamami},
  title        = {A practical implementation of unconditional security for the {IEC}
                  60780-5-101 {SCADA} protocol},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {20},
  pages        = {68--84},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2017.12.001},
  doi          = {10.1016/J.IJCIP.2017.12.001},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/CherifiH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/FaramondiSPPO18,
  author       = {Luca Faramondi and
                  Roberto Setola and
                  Stefano Panzieri and
                  Federica Pascucci and
                  Gabriele Oliva},
  title        = {Finding critical nodes in infrastructure networks},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {20},
  pages        = {3--15},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2017.11.004},
  doi          = {10.1016/J.IJCIP.2017.11.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/FaramondiSPPO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Hagen18,
  author       = {Janne Merete Hagen},
  title        = {Building resilience against cyber threats in the energy sector},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {20},
  pages        = {26--27},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2017.11.003},
  doi          = {10.1016/J.IJCIP.2017.11.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Hagen18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KabirRAAB18,
  author       = {Muhammad Nomani Kabir and
                  Md. Arafatur Rahman and
                  Saiful Azad and
                  Mohamed Mostafa A. Azim and
                  Md. Zakirul Alam Bhuiyan},
  title        = {A connection probability model for communications networks under regional
                  failures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {20},
  pages        = {16--25},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2017.11.002},
  doi          = {10.1016/J.IJCIP.2017.11.002},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/KabirRAAB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/LahzaRF18,
  author       = {Hassan Fareed M. Lahza and
                  Kenneth Radke and
                  Ernest Foo},
  title        = {Applying domain-specific knowledge to construct features for detecting
                  distributed denial-of-service attacks on the {GOOSE} and {MMS} protocols},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {20},
  pages        = {48--67},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2017.12.002},
  doi          = {10.1016/J.IJCIP.2017.12.002},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/LahzaRF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/PuuskaRTLKOV18,
  author       = {Samir Puuska and
                  Lauri Rummukainen and
                  Jussi Timonen and
                  Lauri Laaperi and
                  Markus Klemetti and
                  Lauri Oksama and
                  Jouko Vankka},
  title        = {Nationwide critical infrastructure monitoring using a common operating
                  picture framework},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {20},
  pages        = {28--47},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2017.11.005},
  doi          = {10.1016/J.IJCIP.2017.11.005},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/PuuskaRTLKOV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi18,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {20},
  pages        = {1--2},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.02.004},
  doi          = {10.1016/J.IJCIP.2018.02.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}