-
1
-
-
33845960072
-
Risk Management for Critical Infrastructure Protection Challenges, Best Practices & Tools
-
November
-
E. Adar, A. Wuchner. Risk Management for Critical Infrastructure Protection Challenges, Best Practices & Tools, First Intern. Workshop on Critical Infrastructure Protection, pp 90-100, November 2005.
-
(2005)
First Intern. Workshop on Critical Infrastructure Protection
, pp. 90-100
-
-
Adar, E.1
Wuchner, A.2
-
2
-
-
11144277843
-
Routing techniques in wireless sensor networks: A Survey
-
J. N. Al-Karaki, A. E. Kamal. Routing techniques in wireless sensor networks: a Survey, IEEE Wireless Communications, Vol. 11 Issue 6, pp 6-28, 2004.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.6
, pp. 6-28
-
-
Al-Karaki, J.N.1
Kamal, A.E.2
-
3
-
-
33845947034
-
-
S. A. amtepe, B. Yener. Key Distribution Mechanisms for Wireless Sensor Networks: a Survey, TR-05-07 Rensselaer Polytechnic Institute, Computer Science Department, 2005.
-
S. A. amtepe, B. Yener. Key Distribution Mechanisms for Wireless Sensor Networks: a Survey, TR-05-07 Rensselaer Polytechnic Institute, Computer Science Department, 2005.
-
-
-
-
4
-
-
33845924214
-
Emergency and Rescue: Methodology and Tool for Alert Activation and Crisis Management, Informatik2003
-
L. Carlier, L. Dhaleine, P. Genestier, C. Lac and B. Savina. Emergency and Rescue: Methodology and Tool for Alert Activation and Crisis Management, Informatik2003, Lecture Notes in Informatics, 2003.
-
(2003)
Lecture Notes in Informatics
-
-
Carlier, L.1
Dhaleine, L.2
Genestier, P.3
Lac, C.4
Savina, B.5
-
7
-
-
33845955016
-
-
Information technology: Open systems interconnection. The Directory: Public-key and attribute certificate frameworks. ITU-T Recommendation X.509, 2000.
-
Information technology: Open systems interconnection. The Directory: Public-key and attribute certificate frameworks. ITU-T Recommendation X.509, 2000.
-
-
-
-
10
-
-
84882650415
-
-
Crossbow Technology, Inc
-
Crossbow Technology, Inc. Wireless Measurement Systems, http://www.xbow.com.
-
Wireless Measurement Systems
-
-
-
13
-
-
12344298391
-
-
S. M. Rinaldi. Modeling and Simulating Critical Infrastructures and Their Interdependences. 37th Hawaiian International Conference on system Sciences, 2004.
-
S. M. Rinaldi. Modeling and Simulating Critical Infrastructures and Their Interdependences. 37th Hawaiian International Conference on system Sciences, 2004.
-
-
-
-
15
-
-
20844461569
-
Security Meter: A Practical Decision-Tree Model to Quantify Risk
-
M. Sahinoglu. Security Meter: A Practical Decision-Tree Model to Quantify Risk, IEEE Security & Privacy, vol. 3, n.3, pp. 18-24, 2005.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.3
, pp. 18-24
-
-
Sahinoglu, M.1
-
17
-
-
11144340927
-
Designing Secure Sensor Networks
-
E. Shi, A. Perrig. Designing Secure Sensor Networks. IEEE Wireless Communications, V.11, n.6, pp 38-43, 2004.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.6
, pp. 38-43
-
-
Shi, E.1
Perrig, A.2
-
18
-
-
32144435943
-
-
A. Da Silva, A. Loureiro, M. Martins, L. Ruiz, B. Rocha, H. Wong. Decentralized Intrusion Detection in Wireless Sensor Networks. 1st ACM Intern. Workshop on Quality of Service & Security in Wireless and Mobile Networks, 2005.
-
A. Da Silva, A. Loureiro, M. Martins, L. Ruiz, B. Rocha, H. Wong. Decentralized Intrusion Detection in Wireless Sensor Networks. 1st ACM Intern. Workshop on Quality of Service & Security in Wireless and Mobile Networks, 2005.
-
-
-
-
19
-
-
15944404585
-
-
S. Wolthusen. Modeling Critical Infrastructure Requirements, 5th IEEE SMC Information Assurance Workshop, 2004.
-
S. Wolthusen. Modeling Critical Infrastructure Requirements, 5th IEEE SMC Information Assurance Workshop, 2004.
-
-
-
|