Search

Your search keyword '"Critical infrastructures"' showing total 35 results

Search Constraints

Start Over You searched for: Descriptor "Critical infrastructures" Remove constraint Descriptor: "Critical infrastructures" Publication Type Conference Materials Remove constraint Publication Type: Conference Materials
35 results on '"Critical infrastructures"'

Search Results

1. Economic and Financial Elements of Critical Infrastructure Augmentation.

2. Current Applications and Future Trends of Artificial Intelligence and Machine Learning in the Resilience of Interdependent Critical Infrastructures.

3. Current Applications and Future Trends of Artificial Intelligence and Machine Learning in the Resilience of Interdependent Critical Infrastructures.

4. Current Applications and Future Trends of Artificial Intelligence and Machine Learning in the Resilience of Interdependent Critical Infrastructures.

5. Inter-Organizational IT-Governance for a System of Systems.

6. Prevention of Widespread Ransomware Cyber-Attacks through the SEAP Platform.

7. Security Issues in UAV-Based Infrastructure Monitoring.

8. Security Issues in UAV-Based Infrastructure Monitoring.

9. Critical Infrastructure: A Battlefield for Cyber Warfare?

10. A MULTIDIMENSIONAL APPROACH TO CYBERSECURITY FOR CRITICAL INFRASTRUCTURES.

11. Protection of Critical Infrastructure in National Cyber Security Strategies.

12. Considerations for Specialist Training in the Field of Critical Infrastructures Protection.

13. CONCEPTUALIZATION OF A KNOWLEDGE MANAGEMENT FRAMEWORK DEDICATED TO THE SECURITY OF CRITICAL INFRASTRUCTURES.

14. MODULUS OF RESILIENCE: AN ISOMORPHIC APPLICATION FOR CRITICAL INFRASTRUCTURES.

15. THE ROLE OF THE CORPORATE SECURITY WITHIN THE NATIONAL SECURITY REPRESENTED THROUGH THE SECURITY OF THE CRITICAL INFRASTRUCTURES.

16. PRIVATE SECURITY IN PROTECTION OF CRITICAL INFRASTRUCTURES - LEGAL AND PRACTICAL ASPECTS: COMPARATIVE STUDY OF MACEDONIA AND SLOVENIA.

17. Detecting and Correlating Supranational Threats for Critical Infrastructures.

18. BUSINESS CONTINUITY APPLIED TO eEDUCATION.

19. INCREASING THE CAPABILITY OF NATIONAL EDUCATION IN THE MANAGEMENT OF CRITICAL INFRASTRUCTURE PROTECTION USING INTEGRATED SIMULATION SYSTEMS.

20. CRITICAL INFRASTRUCTURES UNDER CYBER THREATS.

21. SECURITATEA ENERGETICĂ A ROMÂNIEI – POSIBILITĂŢI DE CONSOLIDARE.

22. PROSPECTIVE OF ROMANIA'S NATIONAL STRATEGYFOR THE PROTECTION OF CRITICAL INFRASTRUCTURES.

23. Restoration of Services in Disrupted Interdependent Infrastructure Systems.

24. Vulnerability analysis of coupled heterogeneous critical infrastructures: A Co-simulation approach with a testbed validation.

25. Can We Trust This User? Predicting Insider's Attitude via YouTube Usage Profiling.

26. Essentials of passive defense in electric power systems.

27. RAHMoN: Routing Algorithm for Heterogeneous Mobile Networks.

28. Temporal network reliability in perturbed scenarios: Application to a SCADA system.

29. A methodological framework for vulnerability analysis of critical infrastructures.

30. Mixed Holistic Reductionistic Approach for Impact Assessment of Cyber Attacks.

31. Avoiding Disasters -- Ensuring PKI-Service Availability.

32. An Integrated Simulation Model for Water Purification and Distribution.

33. A Model-Based Assessment of Cyber-Resilience Evaluation for Water Purification Plants with Societal Impact.

34. An Integrated Simulation Model for Water Purification and Distribution.

35. A Model-Based Assessment of Cyber-Resilience Evaluation for Water Purification Plants with Societal Impact.

Catalog

Books, media, physical & digital resources