2020
DOI: 10.1016/j.ijcip.2020.100390
|View full text |Cite
|
Sign up to set email alerts
|

Computer-aided security assessment of water networks monitoring platforms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 55 publications
0
0
0
Order By: Relevance
“…A deeper description of the implementation level details of this model transformation is out of the scope of this paper. An example of an implementation of a similar transformation is presented in [48]. It is important to underline again that this description is not exhaustive and it serves as a baseline to define a formal model-transformation from the CR UML Profile annotated model to the BN model.…”
mentioning
confidence: 99%
“…A deeper description of the implementation level details of this model transformation is out of the scope of this paper. An example of an implementation of a similar transformation is presented in [48]. It is important to underline again that this description is not exhaustive and it serves as a baseline to define a formal model-transformation from the CR UML Profile annotated model to the BN model.…”
mentioning
confidence: 99%