Search

Your search keyword '"Critical infrastructures"' showing total 36 results

Search Constraints

Start Over You searched for: Descriptor "Critical infrastructures" Remove constraint Descriptor: "Critical infrastructures" Publisher ieee Remove constraint Publisher: ieee
36 results on '"Critical infrastructures"'

Search Results

1. On the Generation of Anomaly Detection Datasets in Industrial Control Systems

2. A Synthetic Case Study for Analysis of the Rising Interdependency Between the Power Grid and E-Mobility

3. A Unified Approach for Reliability Assessment of Critical Infrastructures Using Graph Theory and Entropy.

4. Which Targets to Protect in Critical Infrastructures - A Game-Theoretic Solution From a Network Science Perspective

5. Hierarchical Flow Model-Based Impact Assessment of Cyberattacks for Critical Infrastructures.

6. Network Structural Vulnerability: A Multiobjective Attacker Perspective.

7. Synchronization of Critical Infrastructures Dependent Upon GNSS: Current Vulnerabilities and Protection Provided by New Signals.

8. Random Bad State Estimator to Address False Data Injection in Critical Infrastructures

9. Vulnerability Assessment of a Large Electrical Grid by New Graph Theory Approach.

10. A Cyber-Security Methodology for a Cyber-Physical Industrial Control System Testbed

11. Cascading Failures in Interdependent Infrastructures: An Interdependent Markov-Chain Approach.

12. A Response Cost Model for Advanced Metering Infrastructures.

13. On the Generation of Anomaly Detection Datasets in Industrial Control Systems

14. Intelligent Energy Systems: Introducing Power–ICT Interdependency in Modeling and Control Design.

15. I $ \circledR $ ML: An Infrastructure Resilience-Oriented Modeling Language.

16. Vulnerability analysis of coupled heterogeneous critical infrastructures: A Co-simulation approach with a testbed validation.

17. Can We Trust This User? Predicting Insider's Attitude via YouTube Usage Profiling.

18. Essentials of passive defense in electric power systems.

19. RAHMoN: Routing Algorithm for Heterogeneous Mobile Networks.

20. Temporal network reliability in perturbed scenarios: Application to a SCADA system.

21. A methodological framework for vulnerability analysis of critical infrastructures.

22. Mixed Holistic Reductionistic Approach for Impact Assessment of Cyber Attacks.

23. Critical Control System Protection in the 21st Century.

24. A Bayesian Network-Based Approach to the Critical Infrastructure Interdependencies Analysis.

25. Modeling Interdependent Network Systems for Identifying Cascade-Safe Operating Margins.

26. The Crutial Way of Critical Infrastructure Protection.

27. Wide Area Protection—Technology and Infrastructures.

28. Strategic Power Infrastructure Defense.

29. Security challenges for the electricity infrastructure.

30. Towards a Complex Systems Approach to Legal and Economic Impact Analysis of Critical Infrastructures

31. Hybrid Simulation of Distributed Large-Scale Critical Infrastructures

32. How do mobile technologies affect work and private lives? The case of Turkish banking professionals

33. Trust based interdependency weighting for on-line risk monitoring in interdependent critical infrastructures

34. Interdependency modeling and analysis of critical infrastructures based on Dynamic Bayesian Networks

35. An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies

36. Improving resilience of interdependent critical infrastructures via an on-line alerting system

Catalog

Books, media, physical & digital resources