| 
Citations
 | 
   web
Alexander Gabriel, Babette Tecklenburg, & Frank Sill Torres. (2022). Threat and Risk Scenarios for Offshore Wind Farms and an Approach to their Assessment. In Rob Grace, & Hossein Baharmand (Eds.), ISCRAM 2022 Conference Proceedings – 19th International Conference on Information Systems for Crisis Response and Management (pp. 162–173). Tarbes, France.
toggle visibility
Alexander Gabriel, Babette Tecklenburg, Yann Guillouet, & Frank Sill Torres. (2021). Threat analysis of offshore wind farms by Bayesian networks – a new modeling approach. In Anouck Adrot, Rob Grace, Kathleen Moore, & Christopher W. Zobel (Eds.), ISCRAM 2021 Conference Proceedings – 18th International Conference on Information Systems for Crisis Response and Management (pp. 174–185). Blacksburg, VA (USA): Virginia Tech.
toggle visibility
Daniel Lichte, Dustin Witte, & Kai-Dietrich Wolf. (2020). Comprehensive Security Hazard Analysis for Transmission Systems. In Amanda Hughes, Fiona McNeill, & Christopher W. Zobel (Eds.), ISCRAM 2020 Conference Proceedings – 17th International Conference on Information Systems for Crisis Response and Management (pp. 1145–1153). Blacksburg, VA (USA): Virginia Tech.
toggle visibility
Gabriel, A., & Torres, F. S. (2023). Navigating Towards Safe and Secure Offshore Wind Farms: An Indicator Based Approach in the German North and Baltic Sea. In Jaziar Radianti, Ioannis Dokas, Nicolas Lalone, & Deepak Khazanchi (Eds.), Proceedings of the 20th International ISCRAM Conference (pp. 609–619). Omaha, USA: University of Nebraska at Omaha.
toggle visibility
Xiaofeng Hu, Shifei Shen, & Jiansong Wu. (2012). Modeling of attacking and defending strategies in situations with intentional threats. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
toggle visibility
George Leventakis, Athanasios Sfetsos, Vasileios Gkrizis, Nikolas Athanasiadis, Stefan Tönjes, Spyros Kopsidas, et al. (2011). A Security Risk Analysis Framework for interconnected transportation systems. In E. Portela L. S. M.A. Santos (Ed.), 8th International Conference on Information Systems for Crisis Response and Management: From Early-Warning Systems to Preparedness and Training, ISCRAM 2011. Lisbon: Information Systems for Crisis Response and Management, ISCRAM.
toggle visibility
Lida Huang, Guoray Cai, Hongyong Yuan, Jianguo Chen, Yan Wang, & Feng Sun. (2018). Modeling Threats of Mass Incidents Using Scenario-based Bayesian Network Reasoning. In Kees Boersma, & Brian Tomaszeski (Eds.), ISCRAM 2018 Conference Proceedings – 15th International Conference on Information Systems for Crisis Response and Management (pp. 121–134). Rochester, NY (USA): Rochester Institute of Technology.
toggle visibility
Kathryn Toelken, Matthew W. Seeger, & Allen Batteau. (2005). Learning and renewal following threat and crisis: The experience of a computer services firm in response to Y2K and 9/11. In B. C. B. Van de Walle (Ed.), Proceedings of ISCRAM 2005 – 2nd International Conference on Information Systems for Crisis Response and Management (pp. 43–51). Brussels: Royal Flemish Academy of Belgium.
toggle visibility
Vitaveska Lanfranchi, Nadia Noori, & Tudor Sirbu. (2018). GPS-based solution for tracking and protecting humanitarians in conflict zones. In Kees Boersma, & Brian Tomaszeski (Eds.), ISCRAM 2018 Conference Proceedings – 15th International Conference on Information Systems for Crisis Response and Management (pp. 334–349). Rochester, NY (USA): Rochester Institute of Technology.
toggle visibility
Matt Wolff. (2010). Unsupervised methods for detecting a malicious insider. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
toggle visibility