Search dblp for Publications

export results for "toc:db/journals/ijcip/ijcip34.bht:"

 download as .bib file

@article{DBLP:journals/ijcip/AdepuM21,
  author       = {Sridhar Adepu and
                  Aditya Mathur},
  title        = {SafeCI: Avoiding process anomalies in critical infrastructure},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100435},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100435},
  doi          = {10.1016/J.IJCIP.2021.100435},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/AdepuM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/DaweriAA21,
  author       = {Muataz Salam Al Daweri and
                  Salwani Abdullah and
                  Khairul Akram Zainol Ariffin},
  title        = {A homogeneous ensemble based dynamic artificial neural network for
                  solving the intrusion detection problem},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100449},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100449},
  doi          = {10.1016/J.IJCIP.2021.100449},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/DaweriAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/JiaWPCSC21,
  author       = {Yifan Jia and
                  Jingyi Wang and
                  Christopher M. Poskitt and
                  Sudipta Chattopadhyay and
                  Jun Sun and
                  Yuqi Chen},
  title        = {Adversarial attacks and mitigation for anomaly detectors of cyber-physical
                  systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100452},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100452},
  doi          = {10.1016/J.IJCIP.2021.100452},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/JiaWPCSC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/LiWLHDGC21,
  author       = {Fei Li and
                  Jing Wang and
                  Hui Li and
                  Qian Hu and
                  Wenxuan Dan and
                  Liangquan Ge and
                  David Cohen},
  title        = {Evaluation on nuclear emergency response strategies in the Asia-Pacific
                  region},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100447},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100447},
  doi          = {10.1016/J.IJCIP.2021.100447},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/LiWLHDGC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/MedjekTDR21,
  author       = {Faiza Medjek and
                  Djamel Tandjaoui and
                  Nabil Djedjig and
                  Imed Romdhani},
  title        = {Fault-tolerant AI-driven Intrusion Detection System for the Internet
                  of Things},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100436},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100436},
  doi          = {10.1016/J.IJCIP.2021.100436},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/MedjekTDR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RandallA21,
  author       = {Rick G. Randall and
                  Stuart Allen},
  title        = {Cybersecurity professionals information sharing sources and networks
                  in the {U.S.} electrical power industry},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100454},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100454},
  doi          = {10.1016/J.IJCIP.2021.100454},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/RandallA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SafariPK21,
  author       = {Mohammad Safari and
                  Elham Parvinnia and
                  Alireza Keshavarz{-}Haddad},
  title        = {Industrial intrusion detection based on the behavior of rotating machine},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100424},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100424},
  doi          = {10.1016/J.IJCIP.2021.100424},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/SafariPK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SilvaPCM21,
  author       = {Rovedy Aparecida Busquim e Silva and
                  Jos{\'{e}} Roberto Castilho Piqueira and
                  J. J. Cruz and
                  R. P. Marques},
  title        = {Cybersecurity Assessment Framework for Digital Interface Between Safety
                  and Security at Nuclear Power Plants},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100453},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100453},
  doi          = {10.1016/J.IJCIP.2021.100453},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/SilvaPCM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SinghM21,
  author       = {Neeraj Kumar Singh and
                  Vasundhara Mahajan},
  title        = {End-User Privacy Protection Scheme from cyber intrusion in smart grid
                  advanced metering infrastructure},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100410},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100410},
  doi          = {10.1016/J.IJCIP.2021.100410},
  timestamp    = {Thu, 10 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/SinghM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SohouenouN21,
  author       = {Philippe Y. R. Sohouenou and
                  Luis A. C. Neves},
  title        = {Assessing the effects of link-repair sequences on road network resilience},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100448},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100448},
  doi          = {10.1016/J.IJCIP.2021.100448},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/SohouenouN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/TornyeviadziNMS21,
  author       = {Hoese Michel Tornyeviadzi and
                  Fabrice Abunde Neba and
                  Hadi Mohammed and
                  Razak Seidu},
  title        = {Nodal vulnerability assessment of water distribution networks: An
                  integrated Fuzzy {AHP-TOPSIS} approach},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100434},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100434},
  doi          = {10.1016/J.IJCIP.2021.100434},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/TornyeviadziNMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/VavraHLD21,
  author       = {Jan V{\'{a}}vra and
                  Martin Hromada and
                  Ludek Luk{\'{a}}s and
                  Jacek Dworzecki},
  title        = {Adaptive anomaly detection system based on machine learning algorithms
                  in an industrial control environment},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100446},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100446},
  doi          = {10.1016/J.IJCIP.2021.100446},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/VavraHLD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/YadavP21,
  author       = {Geeta Yadav and
                  Kolin Paul},
  title        = {Architecture and security of {SCADA} systems: {A} review},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100433},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100433},
  doi          = {10.1016/J.IJCIP.2021.100433},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/YadavP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics