2020
DOI: 10.1016/j.ijcip.2020.100390
|View full text |Cite
|
Sign up to set email alerts
|

Computer-aided security assessment of water networks monitoring platforms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 55 publications
0
1
0
Order By: Relevance
“…A deeper description of the implementation level details of this model transformation is out of the scope of this paper. An example of an implementation of a similar transformation is presented in [48]. It is important to underline again that this description is not exhaustive and it serves as a baseline to define a formal model-transformation from the CR UML Profile annotated model to the BN model.…”
mentioning
confidence: 99%
“…A deeper description of the implementation level details of this model transformation is out of the scope of this paper. An example of an implementation of a similar transformation is presented in [48]. It is important to underline again that this description is not exhaustive and it serves as a baseline to define a formal model-transformation from the CR UML Profile annotated model to the BN model.…”
mentioning
confidence: 99%