Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Sistema crítica")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 762

  • Page / 31
Export

Selection :

  • and

Towards Next Generation InfrastructuresHERDER, P. M; LUKSZO, Z.International journal of critical infrastructures. 2006, Vol 2, Num 2-3, issn 1475-3219, 207 p.Serial Issue

Building secure critical infrastructuresPALMATIER, Thomas E.International journal of critical infrastructure protection (Print). 2013, Vol 6, Num 2, pp 85-86, issn 1874-5482, 2 p.Article

Security of critical control systems sparks concernGEER, David.Computer (Long Beach, CA). 2006, Vol 39, Num 1, pp 20-23, issn 0018-9162, 4 p.Article

Why are we so unconsciously insecure?LUIIJF, Eric.International journal of critical infrastructure protection (Print). 2013, Vol 6, Num 3-4, pp 179-181, issn 1874-5482, 3 p.Article

The (un)economic internet?CLAFFY, K. C; MEINRATH, Sascha D; BRADNER, Scott O et al.IEEE internet computing. 2007, Vol 11, Num 3, pp 53-58, issn 1089-7801, 6 p.Article

Resolved: The Internet Is No Place for Critical InfrastructureGEER, Dan.Communications of the ACM. 2013, Vol 56, Num 6, pp 48-53, issn 0001-0782, 6 p.Article

Critical information infrastructures security (First international workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006)Lopez, Javier.Lecture notes in computer science. 2006, issn 0302-9743, isbn 978-3-540-69083-2, 1Vol, X-284 p, isbn 978-3-540-69083-2Conference Proceedings

Software Tools-for Safety-Critical Systems According to DO-254KORNECKI, Andrew; BUTKA, Brian; ZALEWSKI, Janusz et al.Computer (Long Beach, CA). 2008, Vol 41, Num 12, pp 112-115, issn 0018-9162, 4 p.Article

Strategic Traceability for Safety-Critical Projects : SAFETY-CRITICAL SOFTWAREMÄDER, Patrick; JONES, Paul L; YI ZHANG et al.IEEE software. 2013, Vol 30, Num 3, pp 58-66, issn 0740-7459, 9 p.Article

TRUSTWORTHY HARDWARE: IDENTIFYING AND CLASSIFYING HARDWARE TROJANSKARRI, Ramesh; RAJENDRAN, Jeyavijayan; ROSENFELD, Kurt et al.Computer (Long Beach, CA). 2010, Vol 43, Num 10, pp 39-46, issn 0018-9162, 8 p.Article

New dilemmas in regulating critical infrastructuresTEN HEUVELHOF, E. F.International journal of critical infrastructures. 2006, Vol 2, Num 2-3, pp 160-170, issn 1475-3219, 11 p.Article

Weathering the UnexpectedKRISHNAN, Kripa.Communications of the ACM. 2012, Vol 55, Num 11, pp 48-52, issn 0001-0782, 5 p.Article

Making Action Visible in Time-critical WorkLANDGREN, Jonas.CHI Conference. 2006, pp 201-210, isbn 1-59593-178-3, 10 p.Conference Paper

Impact of the 2001 world trade center attack on critical interdependent infrastructuresMENDONCA, David; LEE, Earl E; WALLACE, William A et al.International Conference on Systems, Man and Cybernetics. 2004, isbn 0-7803-8566-7, vol5, 4053-4058Conference Paper

Stuxnet and the vital role of critical infrastructure operators and engineersHAGEROTT, Mark.International journal of critical infrastructure protection (Print). 2014, Vol 7, Num 4, pp 244-246, issn 1874-5482, 3 p.Article

Critical Control System Protection in the 21st CenturyALCARAZ, Cristina; ZEADALLY, Sherali.Computer (Long Beach, CA). 2013, Vol 46, Num 10, pp 74-83, issn 0018-9162, 10 p.Article

One Individual's Three Perspectives of the Collegiate Cyber Defense CompetitionSCAPARRA, Jeffrey.Security & management. International conferenceWorldComp'2010. 2010, pp 307-313, isbn 1-60132-159-7 1-60132-162-7 1-60132-163-5, 7 p.Conference Paper

Analysis of Safety-Critical Computer Failures in Medical Devices : Safety-Critical SystemsALEMZADEH, Homa; IYER, Ravishankar K; KALBARCZYK, Zbigniew et al.IEEE security & privacy. 2013, Vol 11, Num 4, pp 14-26, issn 1540-7993, 13 p.Article

Verification and Validation for Trustworthy Software SystemsMICHAEL, James Bret; DRUSINSKY, Doron; OTANI, Thomas W et al.IEEE software. 2011, Vol 28, Num 6, pp 86-92, issn 0740-7459, 7 p.Article

EVOLVING SOFTWARE ARCHITECTURE DESCRIPTIONS OF CRITICAL SYSTEMS : Evolving Critical SystemsMENS, Tom; MAGEE, Jeff; RUMPE, Bernhard et al.Computer (Long Beach, CA). 2010, Vol 43, Num 5, pp 42-48, issn 0018-9162, 7 p.Article

Lessons from StuxnetCHEN, Thomas M; ABU-NIMEH, Saeed.Computer (Long Beach, CA). 2011, Vol 44, Num 4, pp 91-93, issn 0018-9162, 3 p.Article

Risk and vulnerability games. The anti-satellite weaponry (ASAT)GHEORGHE, Adrian V; VAMANU, Dan V.International journal of critical infrastructures. 2007, Vol 3, Num 3-4, pp 457-470, issn 1475-3219, 14 p.Article

Protecting a nation's critical infrastructure : The first stepsLUIIJF, Eric A. M; KLAVER, Marieke H. A.International Conference on Systems, Man and Cybernetics. 2004, isbn 0-7803-8566-7, vol2, 1185-1190Conference Paper

Process improvement in safety critical system development using SPICE or CMMINORDHOFF, Sven; KLEINZ, Jörg.Software & systems engineering and their applications. 2004, pp 1.1-1.5, 3VolConference Paper

Switching Markov chains for a holistic modeling of SIS unavailabilityMECHRI, Walid; SIMON, Christophe; BENOTHMAN, Kamel et al.Reliability engineering & systems safety. 2015, Vol 133, pp 212-222, issn 0951-8320, 11 p.Article

  • Page / 31