Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Sistema crítica")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 498

  • Page / 20
Export

Selection :

  • and

Towards Next Generation InfrastructuresHERDER, P. M; LUKSZO, Z.International journal of critical infrastructures. 2006, Vol 2, Num 2-3, issn 1475-3219, 207 p.Serial Issue

Building secure critical infrastructuresPALMATIER, Thomas E.International journal of critical infrastructure protection (Print). 2013, Vol 6, Num 2, pp 85-86, issn 1874-5482, 2 p.Article

Security of critical control systems sparks concernGEER, David.Computer (Long Beach, CA). 2006, Vol 39, Num 1, pp 20-23, issn 0018-9162, 4 p.Article

The (un)economic internet?CLAFFY, K. C; MEINRATH, Sascha D; BRADNER, Scott O et al.IEEE internet computing. 2007, Vol 11, Num 3, pp 53-58, issn 1089-7801, 6 p.Article

Software Tools-for Safety-Critical Systems According to DO-254KORNECKI, Andrew; BUTKA, Brian; ZALEWSKI, Janusz et al.Computer (Long Beach, CA). 2008, Vol 41, Num 12, pp 112-115, issn 0018-9162, 4 p.Article

TRUSTWORTHY HARDWARE: IDENTIFYING AND CLASSIFYING HARDWARE TROJANSKARRI, Ramesh; RAJENDRAN, Jeyavijayan; ROSENFELD, Kurt et al.Computer (Long Beach, CA). 2010, Vol 43, Num 10, pp 39-46, issn 0018-9162, 8 p.Article

New dilemmas in regulating critical infrastructuresTEN HEUVELHOF, E. F.International journal of critical infrastructures. 2006, Vol 2, Num 2-3, pp 160-170, issn 1475-3219, 11 p.Article

Stuxnet and the vital role of critical infrastructure operators and engineersHAGEROTT, Mark.International journal of critical infrastructure protection (Print). 2014, Vol 7, Num 4, pp 244-246, issn 1874-5482, 3 p.Article

Critical Control System Protection in the 21st CenturyALCARAZ, Cristina; ZEADALLY, Sherali.Computer (Long Beach, CA). 2013, Vol 46, Num 10, pp 74-83, issn 0018-9162, 10 p.Article

One Individual's Three Perspectives of the Collegiate Cyber Defense CompetitionSCAPARRA, Jeffrey.Security & management. International conferenceWorldComp'2010. 2010, pp 307-313, isbn 1-60132-159-7 1-60132-162-7 1-60132-163-5, 7 p.Conference Paper

Lessons from StuxnetCHEN, Thomas M; ABU-NIMEH, Saeed.Computer (Long Beach, CA). 2011, Vol 44, Num 4, pp 91-93, issn 0018-9162, 3 p.Article

Risk and vulnerability games. The anti-satellite weaponry (ASAT)GHEORGHE, Adrian V; VAMANU, Dan V.International journal of critical infrastructures. 2007, Vol 3, Num 3-4, pp 457-470, issn 1475-3219, 14 p.Article

Protecting a nation's critical infrastructure : The first stepsLUIIJF, Eric A. M; KLAVER, Marieke H. A.International Conference on Systems, Man and Cybernetics. 2004, isbn 0-7803-8566-7, vol2, 1185-1190Conference Paper

Process improvement in safety critical system development using SPICE or CMMINORDHOFF, Sven; KLEINZ, Jörg.Software & systems engineering and their applications. 2004, pp 1.1-1.5, 3VolConference Paper

Switching Markov chains for a holistic modeling of SIS unavailabilityMECHRI, Walid; SIMON, Christophe; BENOTHMAN, Kamel et al.Reliability engineering & systems safety. 2015, Vol 133, pp 212-222, issn 0951-8320, 11 p.Article

A conservative bound for the probability of failure of a 1-out-of-2 protection system with one hardware-only and one software-based protection trainBISHOP, Peter; BLOOMFIELD, Robin; LITTLEWOOD, Bev et al.Reliability engineering & systems safety. 2014, Vol 130, pp 61-68, issn 0951-8320, 8 p.Article

A verification framework with application to a propulsion systemBIN ZHANG; ORCHARD, Marcos; SAHA, Bhaskar et al.Expert systems with applications. 2014, Vol 41, Num 13, pp 5669-5679, issn 0957-4174, 11 p.Article

An experimental evaluation of novelty detection methodsXUEMEI DING; YUHUA LI; BELATRECHE, Ammar et al.Neurocomputing (Amsterdam). 2014, Vol 135, pp 313-327, issn 0925-2312, 15 p.Article

An extended study on multi-objective security gamesBROWN, Matthew; BO AN; KIEKINTVELD, Christopher et al.Autonomous agents and multi-agent systems. 2014, Vol 28, Num 1, pp 31-71, issn 1387-2532, 41 p.Article

Bounds on survival probability given mean probability of failure per demand; and the paradoxical advantages of uncertaintySTRIGINI, Lorenzo; WRIGHT, David.Reliability engineering & systems safety. 2014, Vol 128, pp 66-83, issn 0951-8320, 18 p.Article

Discrete techniques applied to low-energy mobile human activity recognition. A new approachALVAREZ DE LA CONCEPCION, M.A; SORIA MORILLO, L.M; GONZALEZ-ABRIL, L et al.Expert systems with applications. 2014, Vol 41, Num 14, pp 6138-6146, issn 0957-4174, 9 p.Article

Evidence-driven decision support in critical infrastructure management through enhanced domain knowledge modeling : Knowledge Management Technologies for Semantic Multimedia ServicesLEE, Seok-Won.Multimedia tools and applications. 2014, Vol 71, Num 1, pp 309-330, issn 1380-7501, 22 p.Article

Markovian agents models for wireless sensor networks deployed in environmental protectionCEROTTI, Davide; GRIBAUDO, Marco; BOBBIO, Andrea et al.Reliability engineering & systems safety. 2014, Vol 130, pp 149-158, issn 0951-8320, 10 p.Article

Distance-Aware Approach for Time-Constraint Wireless Data Querying Based on Game TheoryHAIYANG HU; LIGUO HUANG; HUA HU et al.Journal of information science and engineering. 2014, Vol 30, Num 6, pp 1905-1926, issn 1016-2364, 22 p.Article

A multi-theoretical kernel-based approach to social network-based recommendationXIN LI; MENGYUE WANG; LIANG, T.-P et al.Decision support systems. 2014, Vol 65, pp 95-104, issn 0167-9236, 10 p.Article

  • Page / 20