![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 478 matches
- 2024
- Basem Alkhaleel:
Machine learning applications in the resilience of interdependent critical infrastructure systems - A systematic literature review. Int. J. Crit. Infrastructure Prot. 44: 100646 (2024) - Poornachandratejasvi Laxman Bhattar, Naran M. Pindoriya, Anurag Sharma:
False data injection in distribution system: Attacker's perspective. Int. J. Crit. Infrastructure Prot. 45: 100672 (2024) - Antonio Carlo, Paola Breda:
Impact of space systems capabilities and their role as critical infrastructure. Int. J. Crit. Infrastructure Prot. 45: 100680 (2024) - Jian Chen, Fei Lu, Yuanzhe Liu, Sheng Peng, Zhiming Cai, Fu Mo:
Cross trust: A decentralized MA-ABE mechanism for cross-border identity authentication. Int. J. Crit. Infrastructure Prot. 44: 100661 (2024) - Asma Farooq, Kamal Shahid, Rasmus Løvenstein Olsen:
Securing the green grid: A data anomaly detection method for mitigating cyberattacks on smart meter measurements. Int. J. Crit. Infrastructure Prot. 46: 100694 (2024) - Kirti Gupta, Bijaya Ketan Panigrahi, Anupam Joshi, Kolin Paul:
Demonstration of denial of charging attack on electric vehicle charging infrastructure and its consequences. Int. J. Crit. Infrastructure Prot. 46: 100693 (2024) - Morteza Haghshenas, Rahmat-Allah Hooshmand, Mehdi Gholipour:
A novel cost-based optimization model for electric power distribution systems resilience improvement under dust storms. Int. J. Crit. Infrastructure Prot. 44: 100659 (2024) - Christine Heinzel, Sophie van der Heijden, Aljoscha Mayer, Nathalie Sänger, Simone Sandholz:
Need for intensive care? A socio-technical systems perspective on water supply failure preparedness in German health care facilities. Int. J. Crit. Infrastructure Prot. 44: 100644 (2024) - Venkatachary Sampath Kumar, Jagdish Prasad, Annamalai Alagappan, Leo John Baptist Andrews, Raymon Antony Raj, Sarathkumar Duraisamy:
Cybersecurity and cyber-terrorism challenges to energy-related infrastructures - Cybersecurity frameworks and economics - Comprehensive review. Int. J. Crit. Infrastructure Prot. 45: 100677 (2024) - Tobias Liebetrau, Christian Bueger:
Advancing coordination in critical maritime infrastructure protection: Lessons from maritime piracy and cybersecurity. Int. J. Crit. Infrastructure Prot. 46: 100683 (2024) - Yi-Wei Ma, Yi-Hao Tu, Chih-Ting Shen:
DSACR: A defense-based system with adaptive cyber resilience for industrial control systems. Int. J. Crit. Infrastructure Prot. 45: 100662 (2024) - Midhya Mathew, Faruk Kazi:
Hardware-in-Loop (HIL) Testbed Design of Thermal Power Plant for Threat Modeling and Attack Vector Analysis. Int. J. Crit. Infrastructure Prot. 45: 100675 (2024) - Lazaros Papadopoulos, Konstantinos P. Demestichas, Eva María Muñoz Navarro, Juan Jose Hernandez-Montesinos, Stéphane Paul, Nicolas Museux, Sandra König, Stefan Schauer, Alfonso Climente Alarcón, Israel Pérez-Llopis, Tim H. Stelkens-Kobsch, Tamara Hadjina, Jelena Levak:
Protection of critical infrastructures from advanced combined cyber and physical threats: The PRAETORIAN approach. Int. J. Crit. Infrastructure Prot. 44: 100657 (2024) - Michalis Papamichael, Christos Dimopoulos, Georgios Boustras, Marios Vryonides:
Performing risk assessment for critical infrastructure protection: A study of human decision-making and practitioners' transnationalism considerations. Int. J. Crit. Infrastructure Prot. 45: 100682 (2024) - Khushi Jatinkumar Raval, Nilesh Kumar Jadav, Tejal Rathod, Sudeep Tanwar, Vrince Vimal, Nagendar Yamsani:
A survey on safeguarding critical infrastructures: Attacks, AI security, and future directions. Int. J. Crit. Infrastructure Prot. 44: 100647 (2024) - Nazia Raza, Faegheh Moazeni:
Chance-constrained vulnerability assessment of smart water distribution systems against stealthy false data injection attacks. Int. J. Crit. Infrastructure Prot. 44: 100645 (2024) - Yakub Kayode Saheed, Oluwadamilare Harazeem Abdulganiyu, Kaloma Usman Majikumna, Musa Mustapha, Abebaw Degu Workneh:
ResNet50-1D-CNN: A new lightweight resNet50-One-dimensional convolution neural network transfer learning-based approach for improved intrusion detection in cyber-physical systems. Int. J. Crit. Infrastructure Prot. 45: 100674 (2024) - Roberto Setola:
Critical Entities Resilience. Int. J. Crit. Infrastructure Prot. 45: 100688 (2024) - Y. Shen, W. Zhou:
A comparison of onshore oil and gas transmission pipeline incident statistics in Canada and the United States. Int. J. Crit. Infrastructure Prot. 45: 100679 (2024) - Andrew D. Syrmakesis, Cristina Alcaraz, Nikos D. Hatziargyriou:
DAR-LFC: A data-driven attack recovery mechanism for Load Frequency Control. Int. J. Crit. Infrastructure Prot. 45: 100678 (2024) - Hussam Tarazi, Sara M. Sutton, John Olinjyk, Benjamin Bond, Julian L. Rrushi:
A watchdog model for physics-based anomaly detection in digital substations. Int. J. Crit. Infrastructure Prot. 44: 100660 (2024) - Editorial. Int. J. Crit. Infrastructure Prot. 44: 100667 (2024)
- Awais Yousaf, Ahmed Amro, Philip Teow Huat Kwa, Meixuan Li, Jianying Zhou:
Cyber risk assessment of cyber-enabled autonomous cargo vessel. Int. J. Crit. Infrastructure Prot. 46: 100695 (2024) - Faeze Zare, Payam Mahmoudi Nasr, Rohollah Yousefpour:
A real-time network based anomaly detection in industrial control systems. Int. J. Crit. Infrastructure Prot. 45: 100676 (2024) - Yan Zhang, Degang Zhu, Menglin Wang, Junhan Li, Jie Zhang:
A comparative study of cyber security intrusion detection in healthcare systems. Int. J. Crit. Infrastructure Prot. 44: 100658 (2024) - Taiyi Zhao, Yuchun Tang, Qiming Li, Jingquan Wang:
Enhancing urban system resilience to earthquake disasters: Impact of interdependence and resource allocation. Int. J. Crit. Infrastructure Prot. 45: 100673 (2024) - 2023
- Armin Aalirezaei, Golam Kabir
, Md Saiful Arif Khan:
Dynamic predictive analysis of the consequences of gas pipeline failures using a Bayesian network. Int. J. Crit. Infrastructure Prot. 43: 100638 (2023) - James Ashworth, Jason Staggs, Sujeet Shenoi
:
Radio frequency identification and tracking of vehicles and drivers by exploiting keyless entry systems. Int. J. Crit. Infrastructure Prot. 40: 100587 (2023) - Itzhak Aviv
, Uri Ferri:
Russian-Ukraine armed conflict: Lessons learned on the digital ecosystem. Int. J. Crit. Infrastructure Prot. 43: 100637 (2023) - Kübra Bitirgen
, Ümmühan Basaran Filik
:
A hybrid deep learning model for discrimination of physical disturbance and cyber-attack detection in smart grid. Int. J. Crit. Infrastructure Prot. 40: 100582 (2023)
skipping 448 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-20 08:19 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint