Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Critical system")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 1057

  • Page / 43
Export

Selection :

  • and

Critical systems theoryFISCHER-LESCANO, Andreas.Philosophy & social criticism. 2012, Vol 38, Num 1, pp 3-23, issn 0191-4537, 21 p.Article

Towards Next Generation InfrastructuresHERDER, P. M; LUKSZO, Z.International journal of critical infrastructures. 2006, Vol 2, Num 2-3, issn 1475-3219, 207 p.Serial Issue

Building secure critical infrastructuresPALMATIER, Thomas E.International journal of critical infrastructure protection (Print). 2013, Vol 6, Num 2, pp 85-86, issn 1874-5482, 2 p.Article

Security of critical control systems sparks concernGEER, David.Computer (Long Beach, CA). 2006, Vol 39, Num 1, pp 20-23, issn 0018-9162, 4 p.Article

Why are we so unconsciously insecure?LUIIJF, Eric.International journal of critical infrastructure protection (Print). 2013, Vol 6, Num 3-4, pp 179-181, issn 1874-5482, 3 p.Article

Entwicklung von Mission critical Systemen für industrielle Anwendungen (Engineeringmethoden & Technologien)VDI-Berichte. 2003, issn 0083-5560, isbn 3-18-091809-8, 194 p., isbn 3-18-091809-8Conference Proceedings

Projektmanagement bei der Entwicklung kritischer Software: Ergebnisse einer Umfrage in der Industrie = Project management in the development of critical software: poll results from the industryHILLEBRAND, N; BATZ, Th; WATSON, K et al.VDI-Berichte. 2003, pp 89-94, issn 0083-5560, isbn 3-18-091809-8, 6 p.Conference Paper

Beyond methodology choice: critical systems thinking as critically systemic discourseULRICH, E.The Journal of the Operational Research Society. 2003, Vol 54, Num 4, pp 325-342, issn 0160-5682, 18 p.Article

Using Foucault to analyse ethics in the practice of problem structuring methodsCORDOBA, J.-R.The Journal of the Operational Research Society. 2006, Vol 57, Num 9, pp 1027-1034, issn 0160-5682, 8 p.Article

Reflections on knowledge management from a critical systems perspectiveJACKSON, Mike C.Knowledge management research and practice (Print). 2005, Vol 3, Num 4, pp 187-196, issn 1477-8238, 10 p.Article

The (un)economic internet?CLAFFY, K. C; MEINRATH, Sascha D; BRADNER, Scott O et al.IEEE internet computing. 2007, Vol 11, Num 3, pp 53-58, issn 1089-7801, 6 p.Article

Project experience with IEC 61508 and its consequencesFALLER, Rainer.Lecture notes in computer science. 2001, pp 200-214, issn 0302-9743, isbn 3-540-42607-8Conference Paper

Strategic Traceability for Safety-Critical Projects : SAFETY-CRITICAL SOFTWAREMÄDER, Patrick; JONES, Paul L; YI ZHANG et al.IEEE software. 2013, Vol 30, Num 3, pp 58-66, issn 0740-7459, 9 p.Article

Innovative Testmethoden für sicherheitskritische Software-Anwendungen = Innovative test methods for safety critical software applicationsDAMM, W.VDI-Berichte. 2003, pp 21-35, issn 0083-5560, isbn 3-18-091809-8, 15 p.Conference Paper

Zertifizierung von Sicherheitssystemen und -prozessen nach IEC 61508: Schwerpunkt Hardware = Certification of safety systems and process according to IEC 61508: HardwareRAU, M; SCHMIDT, M.VDI-Berichte. 2003, pp 95-111, issn 0083-5560, isbn 3-18-091809-8, 17 p.Conference Paper

In defence of knowledge constitutive interests. A comment on 'what is this thing called cst?' (Midgley, 1996). Author's replyREYNOLDS, M; MIDGLEY, G.The Journal of the Operational Research Society. 2002, Vol 53, Num 10, pp 1162-1173, issn 0160-5682Article

Energy-efficient communication protocolsCHIASSERINI, Carla F; NUGGEHALLI, Pavan; SRINIVASAN, Vikram et al.Design automation conference. 2002, pp 824-829, isbn 1-58113-461-4, 6 p.Conference Paper

Failure mode analysis of CORBA service implementationsMARSDEN, Eric; FABRE, Jean-Charles.Lecture notes in computer science. 2001, pp 216-231, issn 0302-9743, isbn 3-540-42800-3Conference Paper

Modeling vs. checking with UMLTAÏANI, Francois; PALUDETTO, Mario.Modélisation et vérification des processus parallèles. Ecole d'été. 2000, pp 228-233Conference Paper

Software Tools-for Safety-Critical Systems According to DO-254KORNECKI, Andrew; BUTKA, Brian; ZALEWSKI, Janusz et al.Computer (Long Beach, CA). 2008, Vol 41, Num 12, pp 112-115, issn 0018-9162, 4 p.Article

Clock synchronization algorithms and scheduling issuesBASU, Dhruba; PUNNEKKAT, Sasikumar.Lecture notes in computer science. 2003, pp 45-55, issn 0302-9743, isbn 3-540-20745-7, 11 p.Conference Paper

Resolved: The Internet Is No Place for Critical InfrastructureGEER, Dan.Communications of the ACM. 2013, Vol 56, Num 6, pp 48-53, issn 0001-0782, 6 p.Article

Critical information infrastructures security (First international workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006)Lopez, Javier.Lecture notes in computer science. 2006, issn 0302-9743, isbn 978-3-540-69083-2, 1Vol, X-284 p, isbn 978-3-540-69083-2Conference Proceedings

TRUSTWORTHY HARDWARE: IDENTIFYING AND CLASSIFYING HARDWARE TROJANSKARRI, Ramesh; RAJENDRAN, Jeyavijayan; ROSENFELD, Kurt et al.Computer (Long Beach, CA). 2010, Vol 43, Num 10, pp 39-46, issn 0018-9162, 8 p.Article

New dilemmas in regulating critical infrastructuresTEN HEUVELHOF, E. F.International journal of critical infrastructures. 2006, Vol 2, Num 2-3, pp 160-170, issn 1475-3219, 11 p.Article

  • Page / 43