-
1
-
-
84874495441
-
-
accessed April 26, 2010
-
http://www.independent.co.uk/news/world/europe/contamination-fears-after- leak-from-french-nuclear-waste-plant-863928.html (accessed April 26, 2010)
-
-
-
-
2
-
-
84874507263
-
-
accessed April 26, 2010
-
http://cfpub.epa.gov/safewater/watersecurity/initiative.cfm (accessed April 26, 2010)
-
-
-
-
3
-
-
84874502593
-
-
accessed November 19, 2010
-
http://www.epa.gov/nrmrl/wswrd/dw/epanet.html (accessed November 19, 2010)
-
-
-
-
4
-
-
84871838826
-
Systematic evaluation of contaminant detection through water quality monitoring
-
American Water Works Association
-
Allgeier, S.C., Umberg, K.: Systematic evaluation of contaminant detection through water quality monitoring. In: Water Security Congress Proceedings. American Water Works Association (2008)
-
(2008)
Water Security Congress Proceedings
-
-
Allgeier, S.C.1
Umberg, K.2
-
5
-
-
84874474507
-
ASCE: Interim voluntary guidelines for designing an online contaminant monitoring system
-
Reston,VA
-
ASCE: Interim voluntary guidelines for designing an online contaminant monitoring system. American Society of Civil Engineers, Reston,VA (2004)
-
(2004)
American Society of Civil Engineers
-
-
-
6
-
-
18844398112
-
Sensor placement in municipal water networks
-
Berry, J.W., Fleischer, L., Hart, W.E., Phillips, C.A., Watson, J.P.: Sensor placement in municipal water networks. Journal of Water Resources Planning and Management 131(3), 237-243 (2005)
-
(2005)
Journal of Water Resources Planning and Management
, vol.131
, Issue.3
, pp. 237-243
-
-
Berry, J.W.1
Fleischer, L.2
Hart, W.E.3
Phillips, C.A.4
Watson, J.P.5
-
7
-
-
24944591774
-
ADWICE-Anomaly Detection with Real-Time Incremental Clustering
-
Park, C., Chee, S. (eds.) Springer, Heidelberg
-
Burbeck, K., Nadjm-Tehrani, S.: ADWICE-Anomaly Detection with Real-Time Incremental Clustering. In: Park, C., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 407-424. Springer, Heidelberg (2005)
-
(2005)
ICISC 2004. LNCS
, vol.3506
, pp. 407-424
-
-
Burbeck, K.1
Nadjm-Tehrani, S.2
-
9
-
-
23244446826
-
Real-time detection of intentional chemical contamination in the distribution system
-
Byer, D., Carlson, K.: Real-time detection of intentional chemical contamination in the distribution system. Journal American Water Works Association 97(7) (2005)
-
(2005)
Journal American Water Works Association
, vol.97
, Issue.7
-
-
Byer, D.1
Carlson, K.2
-
10
-
-
85084140752
-
Research challenges for the security of control systems
-
USENIX Association Berkeley
-
Cardenas, A.A., Amin, S., Sastry, S.: Research challenges for the security of control systems. In: Proceedings of the 3rd Conference on Hot Topics in Security, pp. 6:1-6:6. USENIX Association, Berkeley (2008)
-
(2008)
Proceedings of the 3rd Conference on Hot Topics in Security
, pp. 61-66
-
-
Cardenas, A.A.1
Amin, S.2
Sastry, S.3
-
11
-
-
84874499059
-
Scenarios of contaminant diffusion on a medium size urban water distribution network
-
Doglioni, A., Primativo, F., Giustolisi, O., Carbonara, A.: Scenarios of contaminant diffusion on a medium size urban water distribution network, p. 84. ASCE (2008)
-
(2008)
ASCE
, pp. 84
-
-
Doglioni, A.1
Primativo, F.2
Giustolisi, O.3
Carbonara, A.4
-
12
-
-
70349316585
-
Security of Water Infrastructure Systems
-
Setola, R., Geretshuber, S. (eds.) Springer, Heidelberg
-
Eliades, D., Polycarpou, M.: Security of Water Infrastructure Systems. In: Setola, R., Geretshuber, S. (eds.) CRITIS 2008. LNCS, vol. 5508, pp. 360-367. Springer, Heidelberg (2009)
-
(2009)
CRITIS 2008. LNCS
, vol.5508
, pp. 360-367
-
-
Eliades, D.1
Polycarpou, M.2
-
16
-
-
33745240080
-
Identification of contaminant sources in water distribution systems using simulation-optimization method: Case study
-
Guan, J., Aral, M.M., Maslia, M.L., Grayman, W.M.: Identification of contaminant sources in water distribution systems using simulation-optimization method: Case study. Journal of Water Resources Planning and Management 132(4), 252-262 (2006)
-
(2006)
Journal of Water Resources Planning and Management
, vol.132
, Issue.4
, pp. 252-262
-
-
Guan, J.1
Aral, M.M.2
Maslia, M.L.3
Grayman, W.M.4
-
18
-
-
84871590017
-
Canary: A water quality event detection algorithm development tool
-
Hart, D., McKenna, S.A., Klise, K., Cruz, V., Wilson, M.: Canary: A water quality event detection algorithm development tool, pp. 517-517. ASCE (2007)
-
(2007)
ASCE
, pp. 517-517
-
-
Hart, D.1
McKenna, S.A.2
Klise, K.3
Cruz, V.4
Wilson, M.5
-
19
-
-
70350391726
-
Data mining to identify contaminant event locations in water distribution systems
-
Huang, J.J., McBean, E.A.: Data mining to identify contaminant event locations in water distribution systems. Journal of Water Resources Planning and Management 135(6), 466-474 (2009)
-
(2009)
Journal of Water Resources Planning and Management
, vol.135
, Issue.6
, pp. 466-474
-
-
Huang, J.J.1
McBean, E.A.2
-
20
-
-
0032122428
-
Detecting accidental contaminations in municipal water networks
-
Kessler, A., Ostfeld, A., Sinai, G.: Detecting accidental contaminations in municipal water networks. Journal of Water Resources Planning and Management 124(4), 192-198 (1998)
-
(1998)
Journal of Water Resources Planning and Management
, vol.124
, Issue.4
, pp. 192-198
-
-
Kessler, A.1
Ostfeld, A.2
Sinai, G.3
-
21
-
-
84874504319
-
Increasing application of water quality models
-
Khanal, N., Speight, V.: Increasing application of water quality models, pp. 514-514. ASCE (2008)
-
(2008)
ASCE
, pp. 514-514
-
-
Khanal, N.1
Speight, V.2
-
22
-
-
40549089932
-
Multivariate applications for detecting anomalous water quality
-
Klise, K.A.,McKenna, S.A.:Multivariate applications for detecting anomalous water quality, pp. 130-130. ASCE (2006)
-
(2006)
ASCE
, pp. 130-130
-
-
Klise, K.A.1
McKenna, S.A.2
-
24
-
-
33845537069
-
-
Springer, Heidelberg
-
Kruegel, C., Valeur, F., Vigna, G.: Intrusion Detection and Correlation Challenges and Solutions. Springer, Heidelberg (2005)
-
(2005)
Intrusion Detection and Correlation Challenges and Solutions
-
-
Kruegel, C.1
Valeur, F.2
Vigna, G.3
-
25
-
-
0029483552
-
Simulator for contamination diffusion in a Water Distribution Network
-
Kurotani, K., Kubota, M., Akiyama, H., Morimoto, M.: Simulator for contamination diffusion in a water distribution network. In: Proceedings of the 1995 IEEE IECON 21st International Conference on Industrial Electronics, Control, and Instrumentation, vol. 2, pp. 792-797 (1995)
-
(1995)
Proceedings of the 1995 IEEE IECon 21st International Conference on Industrial Electronics, Control, and Instrumentation
, vol.2
, pp. 792-797
-
-
Kurotani, K.1
Kubota, M.2
Akiyama, H.3
Morimoto, M.4
-
26
-
-
33745260437
-
Mixed-integer approach for obtaining unique solutions in source inversion of water networks
-
Laird, C.D., Biegler, L.T., van Bloemen Waanders, B.G.: Mixed-integer approach for obtaining unique solutions in source inversion of water networks. Journal of Water Resources Planning and Management 132(4), 242-251 (2006)
-
(2006)
Journal of Water Resources Planning and Management
, vol.132
, Issue.4
, pp. 242-251
-
-
Laird, C.D.1
Biegler, L.T.2
Van Bloemen Waanders, B.G.3
-
27
-
-
14644409815
-
Contamination source determination for water networks
-
Laird, C.D., Biegler, L.T., van Bloemen Waanders, B.G., Bartlett, R.A.: Contamination source determination for water networks. Journal of Water Resources Planning and Management 131(2), 125-134 (2005)
-
(2005)
Journal of Water Resources Planning and Management
, vol.131
, Issue.2
, pp. 125-134
-
-
Laird, C.D.1
Biegler, L.T.2
Van Bloemen Waanders, B.G.3
Bartlett, R.A.4
-
28
-
-
0026601054
-
Optimal locations of monitoring stations in water distribution system
-
Lee, B.H., Deininger, R.A.: Optimal locations of monitoring stations in water distribution system. Journal of Environmental Engineering 118(1), 4-16 (1992)
-
(1992)
Journal of Environmental Engineering
, vol.118
, Issue.1
, pp. 4-16
-
-
Lee, B.H.1
Deininger, R.A.2
-
29
-
-
70349314691
-
Assessing and Improving SCADA Security in the Dutch DrinkingWater Sector
-
Setola, R., Geretshuber, S. (eds.) Springer, Heidelberg
-
Luiijf, E., Ali, M., Zielstra, A.: Assessing and Improving SCADA Security in the Dutch DrinkingWater Sector. In: Setola, R., Geretshuber, S. (eds.) CRITIS 2008. LNCS, vol. 5508, pp. 190-199. Springer, Heidelberg (2009)
-
(2009)
CRITIS 2008. LNCS
, vol.5508
, pp. 190-199
-
-
Luiijf, E.1
Ali, M.2
Zielstra, A.3
-
30
-
-
33745232535
-
Model for estimating acute health impacts from consumption of contaminated drinking water
-
Murray, R., Uber, J., Janke, R.: Model for estimating acute health impacts from consumption of contaminated drinking water. J. Water Resource Planning and Management 132(4), 293-299 (2006)
-
(2006)
J. Water Resource Planning and Management
, vol.132
, Issue.4
, pp. 293-299
-
-
Murray, R.1
Uber, J.2
Janke, R.3
-
31
-
-
4444318423
-
Optimal layout of early warning detection stations for water distribution systems security
-
Ostfeld, A., Salomons, E.: Optimal layout of early warning detection stations for water distribution systems security. Journal of Water Resources Planning and Management 130(5), 377-385 (2004)
-
(2004)
Journal of Water Resources Planning and Management
, vol.130
, Issue.5
, pp. 377-385
-
-
Ostfeld, A.1
Salomons, E.2
-
33
-
-
33745273008
-
Contamination source identification in water systems: A hybrid model trees-linear programming scheme
-
Preis, A., Ostfeld, A.: Contamination source identification in water systems: A hybrid model trees-linear programming scheme. Journal of Water Resources Planning and Management 132(4), 263-273 (2006)
-
(2006)
Journal of Water Resources Planning and Management
, vol.132
, Issue.4
, pp. 263-273
-
-
Preis, A.1
Ostfeld, A.2
-
34
-
-
33745276530
-
Contamination warning in water networks: General mixed-integer linear models for sensor location design
-
Propato,M.: Contamination warning in water networks: General mixed-integer linear models for sensor location design. Journal of Water Resources Planning and Management 132(4), 225-233 (2006)
-
(2006)
Journal of Water Resources Planning and Management
, vol.132
, Issue.4
, pp. 225-233
-
-
Propato, M.1
-
35
-
-
77955209381
-
Outside the closed world: On using machine learning for network intrusion detection
-
Sommer, R., Paxson, V.: Outside the closed world: On using machine learning for network intrusion detection. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 305-316 (2010)
-
(2010)
2010 IEEE Symposium on Security and Privacy (SP)
, pp. 305-316
-
-
Sommer, R.1
Paxson, V.2
-
36
-
-
2442527089
-
Advanced water distribution modeling and management
-
Walski, T.M., Chase, D.V., Savic, D.A., Grayman, W., Beckwith, S., Koelle, E. (eds.): Advanced water distribution modeling and management. Haestead Press (2004)
-
(2004)
Haestead Press
-
-
Walski, T.M.1
Chase, D.V.2
Savic, D.A.3
Grayman, W.4
Beckwith, S.5
Koelle, E.6
-
37
-
-
69249083272
-
Evolutionary computation-based methods for characterizing contaminant sources in a water distribution system
-
Zechman, E.M., Ranjithan, S.R.: Evolutionary computation-based methods for characterizing contaminant sources in a water distribution system. Journal ofWater Resources Planning and Management 135(5), 334-343 (2009)
-
(2009)
Journal OfWater Resources Planning and Management
, vol.135
, Issue.5
, pp. 334-343
-
-
Zechman, E.M.1
Ranjithan, S.R.2
|