首页 > 最新文献

International Journal of Critical Infrastructure Protection最新文献

英文 中文
A multi-criteria framework for critical infrastructure systems resilience 关键基础设施系统弹性的多标准框架
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100616
Zhuyu Yang, B. Barroca, Katia Laffréchine, Alexandre Weppe, Aurélia Bony-Dandrieux, N. Daclin
{"title":"A multi-criteria framework for critical infrastructure systems resilience","authors":"Zhuyu Yang, B. Barroca, Katia Laffréchine, Alexandre Weppe, Aurélia Bony-Dandrieux, N. Daclin","doi":"10.1016/j.ijcip.2023.100616","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100616","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100616"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A management knowledge graph approach for critical infrastructure protection: Ontology design, information extraction and relation prediction 关键基础设施保护的管理知识图谱方法:本体设计、信息提取和关系预测
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-23 DOI: 10.1016/j.ijcip.2023.100634
Jiarui Chen, Yiqin Lu, Yang Zhang, Fang Huang, Jiancheng Qin

Critical Infrastructures (CI) underpin the basic functioning of society and the economy. Proper governance of CI security management remains a crucial challenge. This study aims to construct a knowledge graph for modeling CI protection. While the previous research has focused on threat intelligence modeling and open knowledge bases, they miss considering the defense side. Accordingly, we propose a knowledge graph for critical infrastructure protection, CIPKG, that extends the management ontology to include the defense side. It addresses the cross-industry and cross-time information gaps that occur in the process of CI protection management, making it more comprehensive in structure than the existing knowledge graph. We employ simplified Structured Threat Information Expression as attack ontology and design a new ontology for the defense side, which could combine with the existing threat ontology to form the CI protection knowledge graph. To dynamically extract information from emerging knowledge, we employ a Bi-directional Long Short-Term Memory and Conditional Random Field model with pre-trained cybersecurity domain-specific Bidirectional Encoder Representations from Transformers to recognize the named entities from CI regulations and standards. To associate the threat part with the management portion of the knowledge graph, we adopt the Knowledge Graph Bidirectional Encoder Representations from Transformer model to capture the semantic information and predict the relationship between threat and management. After information extraction and relation prediction, we build a knowledge graph with 529,360 nodes and about 3,335,000 edges.

关键基础设施是社会和经济基本运作的基础。CI安全管理的适当治理仍然是一个关键挑战。本研究旨在构建一个用于CI保护建模的知识图。虽然之前的研究侧重于威胁情报建模和开放知识库,但他们没有考虑防御方面。因此,我们提出了一个用于关键基础设施保护的知识图CIPKG,它扩展了管理本体以包括防御端。它解决了CI保护管理过程中出现的跨行业、跨时间的信息缺口,使其在结构上比现有的知识图更全面。我们采用简化的结构化威胁信息表达作为攻击本体,并为防御方设计了一个新的本体,该本体可以与现有的威胁本体相结合,形成CI保护知识图。为了从新兴知识中动态提取信息,我们使用双向长短期记忆和条件随机场模型,该模型具有来自Transformers的预先训练的网络安全领域特定双向编码器表示,以识别CI法规和标准中的命名实体。为了将威胁部分与知识图的管理部分相关联,我们采用Transformer模型中的知识图双向编码器表示来捕获语义信息,并预测威胁与管理之间的关系。经过信息提取和关系预测,我们构建了一个具有529360个节点和大约3335000条边的知识图。
{"title":"A management knowledge graph approach for critical infrastructure protection: Ontology design, information extraction and relation prediction","authors":"Jiarui Chen,&nbsp;Yiqin Lu,&nbsp;Yang Zhang,&nbsp;Fang Huang,&nbsp;Jiancheng Qin","doi":"10.1016/j.ijcip.2023.100634","DOIUrl":"10.1016/j.ijcip.2023.100634","url":null,"abstract":"<div><p><span><span>Critical Infrastructures (CI) underpin the basic functioning of society and the economy. Proper governance of CI security management remains a crucial challenge. This study aims to construct a </span>knowledge graph for modeling </span>CI protection<span><span><span><span>. While the previous research has focused on threat intelligence modeling and open knowledge bases, they miss considering the defense side. Accordingly, we propose a knowledge graph for critical infrastructure protection, CIPKG, that extends the management ontology to include the defense side. It addresses the cross-industry and cross-time information gaps that occur in the process of CI protection management, making it more comprehensive in structure than the existing knowledge graph. We employ simplified Structured Threat Information Expression as attack ontology and design a new ontology for the defense side, which could combine with the existing threat ontology to form the CI protection knowledge graph. To dynamically extract information from emerging knowledge, we employ a Bi-directional Long Short-Term Memory and </span>Conditional Random Field model with pre-trained cybersecurity domain-specific </span>Bidirectional Encoder Representations from Transformers to recognize the named entities from CI </span>regulations and standards<span>. To associate the threat part with the management portion of the knowledge graph, we adopt the Knowledge Graph Bidirectional Encoder Representations from Transformer model to capture the semantic information and predict the relationship between threat and management. After information extraction and relation prediction, we build a knowledge graph with 529,360 nodes and about 3,335,000 edges.</span></span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"43 ","pages":"Article 100634"},"PeriodicalIF":3.6,"publicationDate":"2023-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48992216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
National and international maritime situational awareness model examples and the effects of North Stream Pipelines sabotage 国家和国际海上态势感知模型实例和北溪管道破坏的影响
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-01 DOI: 10.1016/j.ijcip.2023.100624
T. A. Gülcan, K. E. Erginer
{"title":"National and international maritime situational awareness model examples and the effects of North Stream Pipelines sabotage","authors":"T. A. Gülcan, K. E. Erginer","doi":"10.1016/j.ijcip.2023.100624","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100624","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100624"},"PeriodicalIF":3.6,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of network expansion decisions for resilient interdependent critical infrastructures with different topologies 具有不同拓扑结构的弹性相互依赖关键基础设施的网络扩展决策评估
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1016/j.ijcip.2023.100623
Achara Tiong, Hector A. Vergara
{"title":"Evaluation of network expansion decisions for resilient interdependent critical infrastructures with different topologies","authors":"Achara Tiong, Hector A. Vergara","doi":"10.1016/j.ijcip.2023.100623","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100623","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100623"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robustness analysis of electricity networks against failure or attack: The case of the Australian National Electricity Market (NEM) 电网对故障或攻击的鲁棒性分析:澳大利亚国家电力市场(NEM)的案例
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1016/j.ijcip.2023.100600
Wensheng Wang , Faezeh Karimi , Kaveh Khalilpour , David Green , Manos Varvarigos

This study explores network science algorithms for the robustness analysis of electricity networks. We first investigate the characteristics of key network models including random graphs, small-world, and scale-free networks. Then, various measures are explored for the robustness of such networks against failure or attack, utilizing topological features and percolation theory. Both weighted and unweighted scenarios are studied, with network voltage considered as the edge weight. For a case study, we investigate the network characteristics as well as the robustness of the Australian National Electricity Market (NEM) network on the basis of these models and theories.

The NEM is the world's longest interconnected power system, with an end-to-end distance of over 5000 km between the state of Queensland in the north and the state of South Australia. Our data contains 2375 transmission lines and 1538 nodes as generators or large demand customers. Our study shows that the NEM as an unweighted network is a small-world network (with exponential degree distribution). However, as a weighted network (considering the voltage capacity of nodes), it has a scale-free topology (following a power-law degree distribution). Robustness analysis revealed that the NEM presents relatively stronger robustness when facing random errors than when facing intentional attacks to nodes with a high degree centrality. It also revealed the sensitivity of the scale-free network to deliberate attacks directed toward important “hubs” (interconnected nodes).

本研究探讨了用于电网鲁棒性分析的网络科学算法。我们首先研究了关键网络模型的特征,包括随机图、小世界和无标度网络。然后,利用拓扑特征和渗流理论,探讨了这种网络对故障或攻击的鲁棒性的各种措施。研究了加权和未加权的情况,将网络电压视为边缘权重。作为案例研究,我们在这些模型和理论的基础上研究了澳大利亚国家电力市场(NEM)网络的网络特征以及稳健性。NEM是世界上互联时间最长的电力系统,北部昆士兰州和南澳大利亚州之间的端到端距离超过5000公里。我们的数据包含2375条输电线路和1538个节点,作为发电机或大需求客户。我们的研究表明,作为一个未加权网络的NEM是一个小世界网络(具有指数度分布)。然而,作为一个加权网络(考虑节点的电压容量),它具有无标度拓扑(遵循幂律度分布)。鲁棒性分析表明,与对具有高度中心性的节点的有意攻击相比,NEM在面对随机错误时表现出相对更强的鲁棒性。它还揭示了无标度网络对针对重要“枢纽”(互连节点)的蓄意攻击的敏感性。
{"title":"Robustness analysis of electricity networks against failure or attack: The case of the Australian National Electricity Market (NEM)","authors":"Wensheng Wang ,&nbsp;Faezeh Karimi ,&nbsp;Kaveh Khalilpour ,&nbsp;David Green ,&nbsp;Manos Varvarigos","doi":"10.1016/j.ijcip.2023.100600","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100600","url":null,"abstract":"<div><p>This study explores network science algorithms for the robustness analysis of electricity networks. We first investigate the characteristics of key network models including random graphs, small-world, and scale-free networks. Then, various measures are explored for the robustness of such networks against failure or attack, utilizing topological features<span> and percolation theory. Both weighted and unweighted scenarios are studied, with network voltage considered as the edge weight. For a case study, we investigate the network characteristics as well as the robustness of the Australian National Electricity Market (NEM) network on the basis of these models and theories.</span></p><p><span>The NEM is the world's longest interconnected power system, with an end-to-end distance of over 5000 km between the state of Queensland in the north and the state of South Australia. Our data contains 2375 transmission lines and 1538 nodes as generators or large demand customers. Our study shows that the NEM as an </span>unweighted network is a small-world network (with exponential degree distribution). However, as a weighted network (considering the voltage capacity of nodes), it has a scale-free topology (following a power-law degree distribution). Robustness analysis revealed that the NEM presents relatively stronger robustness when facing random errors than when facing intentional attacks to nodes with a high degree centrality. It also revealed the sensitivity of the scale-free network to deliberate attacks directed toward important “hubs” (interconnected nodes).</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"41 ","pages":"Article 100600"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49903702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CAPTAIN: Community-based Advanced Persistent Threat Analysis in IT Networks 队长:基于社区的IT网络高级持续威胁分析
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1016/j.ijcip.2023.100620
Ali Ahmadian Ramaki, A. G. Bafghi, Abbas Rasoolzadegan Barforoush
{"title":"CAPTAIN: Community-based Advanced Persistent Threat Analysis in IT Networks","authors":"Ali Ahmadian Ramaki, A. G. Bafghi, Abbas Rasoolzadegan Barforoush","doi":"10.1016/j.ijcip.2023.100620","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100620","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100620"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerable underground entrance understanding for visual surveillance systems 基于视觉监控系统的脆弱地下入口理解
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1016/j.ijcip.2023.100589
Luping Wang , Hui Wei , Yun Hao

Protecting critical infrastructure through visual surveillance is of vital importance, especially in underground entrance environments where large chunks of sloping glass ceilings are particularly susceptible to various types of terrorist activity. However, owing to the diversity of underground entrance environments, understanding them remains a challenge. Traditional 3D layout and object pose estimation that are evaluated on 3D point clouds or RGB-D data are energy-consuming and difficult to account for semantic information in environments. In this study, we present a methodology to understand underground entrance environments, and to recover their 3D reconstruction from a monocular camera. Clusters of sloping angle projections are extracted. Through their corresponding vanishing points (VPs), surfaces of sloping structures are estimated. Relative geometric constraints of different planes are built to bridge the gap between 2D sloping surfaces and 3D reconstruction without precise depth or point clouds. An underground entrance scene is approximated by Manhattan and sloping non-Manhattan structures in 3D reconstruction. The approach requires no prior training, and it requires neither the camera being calibrated nor the camera internal parameters being constant. Compared to the ground truth, the percentage of incorrectly understood pixels were measured and the results demonstrated that the method can successfully understand underground entrance scenes, meeting the requirements in safety monitoring for critical infrastructures from a resource-constrained surveillance camera.

通过视觉监视保护关键基础设施至关重要,尤其是在地下入口环境中,大块倾斜的玻璃天花板特别容易受到各种恐怖活动的影响。然而,由于地下入口环境的多样性,理解它们仍然是一个挑战。在3D点云或RGB-D数据上评估的传统3D布局和对象姿态估计是耗能的,并且难以考虑环境中的语义信息。在这项研究中,我们提出了一种方法来了解地下入口环境,并从单眼相机中恢复其3D重建。提取倾斜角度投影的簇。通过它们对应的消失点(VP)来估计倾斜结构的表面。建立了不同平面的相对几何约束,以在没有精确深度或点云的情况下弥合2D斜面和3D重建之间的差距。在3D重建中,地下入口场景由曼哈顿和倾斜的非曼哈顿结构近似。该方法不需要事先培训,也不需要校准相机,也不要求相机内部参数恒定。与地面实况相比,测量了不正确理解像素的百分比,结果表明,该方法可以成功地理解地下入口场景,满足通过资源受限的监控摄像头对关键基础设施进行安全监控的要求。
{"title":"Vulnerable underground entrance understanding for visual surveillance systems","authors":"Luping Wang ,&nbsp;Hui Wei ,&nbsp;Yun Hao","doi":"10.1016/j.ijcip.2023.100589","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100589","url":null,"abstract":"<div><p><span>Protecting critical infrastructure through visual surveillance is of vital importance, especially in underground entrance environments where large chunks of sloping glass ceilings are particularly susceptible to various types of terrorist activity. However, owing to the diversity of underground entrance environments, understanding them remains a challenge. Traditional 3D layout and object pose estimation that are evaluated on 3D point clouds or RGB-D data are energy-consuming and difficult to account for semantic information in environments. In this study, we present a methodology to understand underground entrance environments, and to recover their </span>3D reconstruction<span> from a monocular camera. Clusters of sloping angle projections are extracted. Through their corresponding vanishing points (VPs), surfaces of sloping structures are estimated. Relative geometric constraints of different planes are built to bridge the gap between 2D sloping surfaces and 3D reconstruction without precise depth or point clouds. An underground entrance scene is approximated by Manhattan and sloping non-Manhattan structures in 3D reconstruction. The approach requires no prior training, and it requires neither the camera being calibrated nor the camera internal parameters being constant. Compared to the ground truth, the percentage of incorrectly understood pixels were measured and the results demonstrated that the method can successfully understand underground entrance scenes, meeting the requirements in safety monitoring for critical infrastructures from a resource-constrained surveillance camera.</span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"41 ","pages":"Article 100589"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49903700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systemic risk mitigation strategy for power grid cascade failures using constrained spectral clustering 基于约束谱聚类的电网级联故障系统风险缓解策略
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1016/j.ijcip.2023.100622
Mohamed Salama, Wael ElDakhakhni, M. Tait
{"title":"Systemic risk mitigation strategy for power grid cascade failures using constrained spectral clustering","authors":"Mohamed Salama, Wael ElDakhakhni, M. Tait","doi":"10.1016/j.ijcip.2023.100622","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100622","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100622"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial on Protection vs Resilience by Prof. Roberto Setola Roberto Setola教授关于保护与恢复力的社论
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1016/S1874-5482(23)00021-5
Roberto Setola
{"title":"Editorial on Protection vs Resilience by Prof. Roberto Setola","authors":"Roberto Setola","doi":"10.1016/S1874-5482(23)00021-5","DOIUrl":"https://doi.org/10.1016/S1874-5482(23)00021-5","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"41 ","pages":"Article 100608"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49903701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attacking the grid: Lessons from a guerrilla conflict and efforts for peace in Colombia: 1990-2018 攻击电网:哥伦比亚游击队冲突的教训和和平努力:1990-2018
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1016/j.ijcip.2023.100621
J. Holmes, Agustin Palao, Mercedez Callenes, Neil Ortiz Silva, Alvaro Cardenas
{"title":"Attacking the grid: Lessons from a guerrilla conflict and efforts for peace in Colombia: 1990-2018","authors":"J. Holmes, Agustin Palao, Mercedez Callenes, Neil Ortiz Silva, Alvaro Cardenas","doi":"10.1016/j.ijcip.2023.100621","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100621","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100621"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Critical Infrastructure Protection
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1