![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
International Journal of Critical Infrastructure Protection, Volume 38
Volume 38, September 2022
- Muhammad Azmi Umer
, Khurum Nazir Junejo
, Muhammad Taha Jilani
, Aditya P. Mathur:
Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations. 100516 - Jonas Franken
, Thomas Reinhold
, Lilian Reichert, Christian Reuter
:
The digital divide in state vulnerability to submarine communications cable failure. 100522 - Peter Donnelly
, Mabrouka Abuhmida, Christopher Tubb:
The drift of industrial control systems to pseudo security. 100535 - Shuliang Wang, Chen Chen, Jianhua Zhang, Xifeng Gu, Xiaodi Huang
:
Vulnerability assessment of urban road traffic systems based on traffic flow. 100536 - Zhiqiang Liu, Mohi-Ud-Din Ghulam
, Jiangbin Zheng, Sifei Wang, Muhammad Asim:
A novel deep learning based security assessment framework for enhanced security in swarm network environment. 100540 - Wu Wang
, Fouzi Harrou
, Benamar Bouyeddou, Sidi-Mohammed Senouci, Ying Sun:
Cyber-attacks detection in industrial systems using artificial intelligence-driven methods. 100542 - Piroska Haller, Béla Genge, Fabrizio Forloni, Gianmarco Baldini, Massimo Carriero, Georgios Fontaras:
Corrigendum to 'VetaDetect: Vehicle tampering detection with closed-loop model ensemble' International Journal of Critical Infrastructure Protection, 37 (2022), 100525. 100543 - Tarek Berghout
, Mohamed Benbouzid
, S. M. Muyeen:
Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects. 100547 - Nils Mäurer
, Tobias Guggemos, Thomas Ewert, Thomas Gräupl
, Corinna Schmitt, Sophia Grundner-Culemann:
Security in Digital Aeronautical Communications A Comprehensive Gap Analysis. 100549 - Ibrahim Nadir
, Haroon Mahmood, Ghalib Asadullah Shah:
A taxonomy of IoT firmware security and principal firmware analysis techniques. 100552 - Jun Yang, Leixiong Huang, Haoming Ma, Zhihui Xu, Ming Yang, Shaoqiang Guo
:
A 2D-graph model-based heuristic approach to visual backtracking security vulnerabilities in physical protection systems. 100554 - Saulius Rudys
, Jurgis Aleksandravicius, Rimvydas Aleksiejunas
, Andriy Konovaltsev, Chen Zhu
, Lukasz A. Greda:
Physical layer protection for ADS-B against spoofing and jamming. 100555
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.