Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 19 matches
- 2020
- Simin Nadjm-Tehrani:
Critical Information Infrastructures Security - 14th International Conference, CRITIS 2019, Linköping, Sweden, September 23-25, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11777, Springer 2020, ISBN 978-3-030-37669-7 [contents] - 2019
- Tomomi Aoyama, Atsushi Sato, Giuseppe Lisi, Kenji Watanabe:
On the Importance of Agility, Transparency, and Positive Reinforcement in Cyber Incident Crisis Communication. CRITIS 2019: 163-168 - Giacomo Assenza, Valerio Cozzani, Francesco Flammini, Nadezhda Gotcheva, Tommy Gustafsson, Anders Hansson, Jouko Heikkilä, Matteo Iaiani, Sokratis K. Katsikas, Minna Nissilä, Gabriele Oliva, Eleni Richter, Maaike Roelofs, Mehdi Saman Azari, Roberto Setola, Wouter Stejin, Alessandro Tugnoli, Dolf Vanderbeek, Lars Westerdahl, Marja Ylönen, Heather Young:
White Paper on Industry Experiences in Critical Information Infrastructure Security: A Special Session at CRITIS 2019. CRITIS 2019: 197-207 - Carlo Dambra, Chanan Graf, Jordi Arias, Alex Gralewski:
A Dynamic Risk Assessment (DRA) Methodology for High Impact Low Probability (HILP) Security Risks. CRITIS 2019: 176-181 - Zack Ellerby, Josie McCulloch, Melanie Wilson, Christian Wagner:
Exploring How Component Factors and Their Uncertainty Affect Judgements of Risk in Cyber-Security. CRITIS 2019: 31-42 - Aristeidis Farao, Juan Enrique Rubio, Cristina Alcaraz, Christoforos Ntantogian, Christos Xenakis, Javier López:
SealedGRID: A Secure Interconnection of Technologies for Smart Grid Applications. CRITIS 2019: 169-175 - Luisa Franchina, Guido Carlomagno:
A Comparison Between SWIFT and Blockchain from a Cyber Resiliency Perspective. CRITIS 2019: 149-160 - Tatiana Galibus:
Securing Software Updates for Trains. CRITIS 2019: 137-148 - Yuning Jiang, Yacine Atif, Jianguo Ding:
Cyber-Physical Systems Security Based on a Cross-Linked and Correlated Vulnerability Database. CRITIS 2019: 71-82 - BooJoong Kang, David Umsonst, Mario Faschang, Christian Seitl, Ivo Friedberg, Friederich Kupzog, Henrik Sandberg, Kieran McLaughlin:
Intrusion Resilience for PV Inverters in a Distribution Grid Use-Case Featuring Dynamic Voltage Control. CRITIS 2019: 97-109 - Joeri van Laere, Björn J. E. Johansson, Leif Olsson, Peter Määttä:
Mitigating Escalation of Cascading Effects of a Payment Disruption Across Other Critical Infrastructures: Lessons Learned in 15 Simulation-Games. CRITIS 2019: 110-121 - Qin Lin, Sicco Verwer, Robert E. Kooij, Aditya Mathur:
Using Datasets from Industrial Control Systems for Cyber Security Research and Education. CRITIS 2019: 122-133 - Daniel Lückerath, Eva Streberová, Manfred Bogen, Erich Rome, Oliver Ullrich, Eva Pauditsová:
Climate Change Impact and Vulnerability Analysis in the City of Bratislava: Application and Lessons Learned. CRITIS 2019: 83-94 - Jezdimir Milosevic, Sebin Gracy, Henrik Sandberg:
On Actuator Security Indices. CRITIS 2019: 182-187 - David M. Nicol:
Challenges in Quantifying an Adversary's Cyber Access to Critical Infrastructures. CRITIS 2019: 18-28 - Gabriele Oliva, Annunziata Esposito Amideo, Stefano Starita, Roberto Setola, Maria Paola Scaparra:
Aggregating Centrality Rankings: A Novel Approach to Detect Critical Infrastructure Vulnerabilities. CRITIS 2019: 57-68 - Awais Rashid, Joseph Gardiner, Benjamin Green, Barnaby Craggs:
Everything Is Awesome! or Is It? Cyber Security Risks in Critical Infrastructure. CRITIS 2019: 3-17 - Stefan Schauer, Thomas Grafenauer, Sandra König, Manuel Warum, Stefan Rass:
Estimating Cascading Effects in Cyber-Physical Critical Infrastructures. CRITIS 2019: 43-56 - Viktor Tuul, Henrik Sandberg:
Testbed Evaluation of DoS Attacks on PID-Controllers. CRITIS 2019: 188-194
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-01 04:55 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint