Author of the publication

Vulnerability modeling and analysis for critical infrastructure protection applications.

, , , , , , , and . Int. J. Crit. Infrastructure Prot., 6 (3-4): 217-227 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interfaces and binding in component based development of formal models., , , , , and . VALUETOOLS, page 44. ICST/ACM, (2009)Model-Driven V&V Processes for Computer Based Control Systems: A Unifying Perspective., , , , and . ISoLA (2), volume 7610 of Lecture Notes in Computer Science, page 190-204. Springer, (2012)Towards a novel conceptualization of Cyber Resilience., and . SERVICES, page 189-196. IEEE, (2020)AI and Sustainability: Territorial Monitoring and Waste Valorization., , , , , , , , , and . Ital-IA, volume 3486 of CEUR Workshop Proceedings, page 571-574. CEUR-WS.org, (2023)Toward a System for Post-Earthquake Safety Evaluation of Masonry Buildings., , , , and . ICIAP (2), volume 13232 of Lecture Notes in Computer Science, page 312-323. Springer, (2022)Chatbots Meet eHealth: Automatizing Healthcare., , , , , and . WAIAH@AI*IA, volume 1982 of CEUR Workshop Proceedings, page 40-49. CEUR-WS.org, (2017)Handwriting and Drawing for Depression Detection: A Preliminary Study., , , , , , , , and . CoRR, (2023)Digitizer: A Synthetic Dataset for Well-Log Analysis., , , , , , and . ICIAP Workshops (1), volume 14365 of Lecture Notes in Computer Science, page 97-105. Springer, (2023)Compositional modeling of railway Virtual Coupling with Stochastic Activity Networks., , , and . Formal Aspects Comput., 33 (6): 989-1007 (2021)Effects of hidden layer sizing on CNN fine-tuning., , and . Future Gener. Comput. Syst., (2021)