Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             13 results found
no title author magazine year volume issue page(s) type
1 A CBK for Information Security and Critical Information and Communication Infrastructure Protection Theoharidou, Marianthi
2008
1 C p. 81-96
16 p.
article
2 Assessing operational risk in the financial sector, using interdependency metrics Macaulay, Tyson
2008
1 C p. 45-52
8 p.
article
3 Attack taxonomies for the Modbus protocols Huitsing, Peter
2008
1 C p. 37-44
8 p.
article
4 Critical infrastructure protection George, Richard
2008
1 C p. 4-5
2 p.
article
5 Decentralized risk management for strategic preparedness of critical infrastructure through decomposition of the inoperability input–output model Crowther, Kenneth G.
2008
1 C p. 53-67
15 p.
article
6 Editorial Board 2008
1 C p. IFC-
1 p.
article
7 Game-theoretic modeling and analysis of insider threats Liu, Debin
2008
1 C p. 75-80
6 p.
article
8 Modeling the NAJPTC network using NS-2 Craven, Paul Vincent
2008
1 C p. 29-36
8 p.
article
9 Models of critical information infrastructure protection Assaf, Dan
2008
1 C p. 6-14
9 p.
article
10 [No title] Shenoi, Sujeet
2008
1 C p. 1-2
2 p.
article
11 [No title] Strous, Leon
2008
1 C p. 3-
1 p.
article
12 Security analysis of RSVP-TE signaling in MPLS networks Spainhower, Michael
2008
1 C p. 68-74
7 p.
article
13 Security and the US rail infrastructure Hartong, Mark
2008
1 C p. 15-28
14 p.
article
                             13 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands