Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             38 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems Goldenberg, Niv
2013
2 p. 63-75
13 p.
artikel
2 A control system testbed to validate critical infrastructure protection concepts Morris, Thomas
2011
2 p. 88-103
16 p.
artikel
3 A framework for studying mortality arising from critical infrastructure loss Yates, Athol
2014
2 p. 100-111
12 p.
artikel
4 Agent-based input–output interdependency model Oliva, Gabriele
2010
2 p. 76-82
7 p.
artikel
5 A length-based, multiple-resource formulation for shortest path network interdiction problems in the transportation sector Yates, Justin
2013
2 p. 107-119
13 p.
artikel
6 Analysis of the effects of distributed denial-of-service attacks on MPLS networks Genge, Béla
2013
2 p. 87-95
9 p.
artikel
7 An exploration of defensive deception in industrial communication networks Rrushi, Julian L.
2011
2 p. 66-75
10 p.
artikel
8 Are we prepared for the economic risk resulting from telecom hotel disruptions? Armbruster, Ginger
2012
2 p. 55-65
11 p.
artikel
9 A signaling framework to deter aggression in cyberspace Rice, Mason
2011
2 p. 57-65
9 p.
artikel
10 Building secure critical infrastructures Palmatier, Thomas E.
2013
2 p. 85-86
2 p.
artikel
11 Control systems personnel are from Mars; IT personnel are from Venus Conklin, William Arthur
2011
2 p. 76-77
2 p.
artikel
12 Coupled Petri nets for computer network risk analysis Henry, Matthew H.
2010
2 p. 67-75
9 p.
artikel
13 Cyber war realities—What lies ahead Miller, Robert A.
2012
2 p. 84-85
2 p.
artikel
14 Design and implementation of a mediation system enabling secure communication among Critical Infrastructures Castrucci, Marco
2012
2 p. 86-97
12 p.
artikel
15 Editorial Shenoi, Sujeet
2010
2 p. 51-52
2 p.
artikel
16 Editorial Shenoi, Sujeet
2011
2 p. 55-56
2 p.
artikel
17 Editorial Board 2010
2 p. IFC-
1 p.
artikel
18 Editorial Board 2014
2 p. IFC-
1 p.
artikel
19 Editorial Board 2011
2 p. IFC-
1 p.
artikel
20 Editorial Board 2013
2 p. IFC-
1 p.
artikel
21 Editorial Board 2012
2 p. IFC-
1 p.
artikel
22 Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices Bodenheim, Roland
2014
2 p. 114-123
10 p.
artikel
23 Firmware modification attacks on programmable logic controllers Basnight, Zachry
2013
2 p. 76-84
9 p.
artikel
24 Fragility of oil as a critical infrastructure problem Jaradat, Ra’ed M.
2014
2 p. 86-99
14 p.
artikel
25 Identifying critical infrastructure sectors and their dependencies: An Indian scenario Singh, Abhishek Narain
2014
2 p. 71-85
15 p.
artikel
26 Intrusion detection for resource-constrained embedded control systems in the power grid Reeves, Jason
2012
2 p. 74-83
10 p.
artikel
27 Maintenance, mishaps and mending in deployments of the domain name system security extensions (DNSSEC) Deccio, Casey
2012
2 p. 98-103
6 p.
artikel
28 [No title] Shenoi, Sujeet
2014
2 p. 69-70
2 p.
artikel
29 [No title] Shenoi, Sujeet
2013
2 p. 61-62
2 p.
artikel
30 [No title] Shenoi, Sujeet
2012
2 p. 53-54
2 p.
artikel
31 Observations from a Cyber Tabletop George, Richard
2014
2 p. 112-113
2 p.
artikel
32 Radio-frequency-based anomaly detection for programmable logic controllers in the critical infrastructure Stone, Samuel
2012
2 p. 66-73
8 p.
artikel
33 Risk-informed assessment of regional preparedness: A case study of emergency potable water for hurricane response in Southeast Virginia Crowther, Kenneth G.
2010
2 p. 83-98
16 p.
artikel
34 Securing wastewater facilities from accidental and intentional harm: A cost-benefit analysis Papa, Stephen
2013
2 p. 96-106
11 p.
artikel
35 Security analysis of the ADS-B implementation in the next generation air transportation system McCallie, Donald
2011
2 p. 78-87
10 p.
artikel
36 The SEMA referential framework: Avoiding ambiguities in the terms “security” and “safety” Piètre-Cambacédès, Ludovic
2010
2 p. 55-66
12 p.
artikel
37 What makes critical infrastructures Critical? Cohen, Fred
2010
2 p. 53-54
2 p.
artikel
38 Whither cyberpower? Rowland, Jill
2014
2 p. 124-137
14 p.
artikel
                             38 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland