ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Breaking into BIM: Performing static and dynamic security analysis with the aid of BIM
Automation in Construction
◽
10.1016/j.autcon.2013.12.002
◽
2014
◽
Vol 40
◽
pp. 84-95
◽
Cited By ~ 18
Author(s):
Stuart Porter
◽
Terence Tan
◽
Tele Tan
◽
Geoff West
Keyword(s):
Security Analysis
◽
Dynamic Security
◽
Dynamic Security Analysis
Download Full-text
Related Documents
Cited By
References
Dynamic security analysis of an electric power system using a combined Monte Carlo-hybrid transient stability approach
2001 IEEE Porto Power Tech Proceedings (Cat. No.01EX502)
◽
10.1109/ptc.2001.964742
◽
2002
◽
Cited By ~ 4
Author(s):
C.M.M. Ferreira
◽
J.A. Dias Pinto
◽
F.P.M. Barbosa
Keyword(s):
Monte Carlo
◽
Power System
◽
Electric Power
◽
Transient Stability
◽
Security Analysis
◽
Electric Power System
◽
Dynamic Security
◽
Dynamic Security Analysis
Download Full-text
Machine learning approach to power system dynamic security analysis
IEEE PES Power Systems Conference and Exposition, 2004.
◽
10.1109/psce.2004.1397549
◽
2005
◽
Cited By ~ 5
Author(s):
T. Niimura
◽
H.S. Ko
◽
H. Xu
◽
A. Moshref
◽
K. Morison
Keyword(s):
Machine Learning
◽
Power System
◽
Security Analysis
◽
System Dynamic
◽
Learning Approach
◽
Dynamic Security
◽
Machine Learning Approach
◽
Dynamic Security Analysis
Download Full-text
Dynamic Security Analysis in Longitudinal Power Systems
IFAC Proceedings Volumes
◽
10.1016/s1474-6670(17)60466-x
◽
1985
◽
Vol 18
(7)
◽
pp. 427-434
Author(s):
F. Aboytes
◽
G. Arroyo
Keyword(s):
Power Systems
◽
Security Analysis
◽
Dynamic Security
◽
Dynamic Security Analysis
Download Full-text
Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane
2019 IEEE Symposium on Security and Privacy (SP)
◽
10.1109/sp.2019.00038
◽
2019
◽
Cited By ~ 13
Author(s):
Hongil Kim
◽
Jiho Lee
◽
Eunkyu Lee
◽
Yongdae Kim
Keyword(s):
Security Analysis
◽
Control Plane
◽
Dynamic Security
◽
Dynamic Security Analysis
Download Full-text
Dynamic Security Analysis of Zoom, Google Meet and Microsoft Teams
Silicon Valley Cybersecurity Conference - Communications in Computer and Information Science
◽
10.1007/978-3-030-72725-3_1
◽
2021
◽
pp. 3-24
Author(s):
Nicholas Hunter Gauthier
◽
Mohammad Iftekhar Husain
Keyword(s):
Security Analysis
◽
Dynamic Security
◽
Dynamic Security Analysis
Download Full-text
A Quantitative Model for Dynamic Security Analysis of Wireless Sensor Networks
GLOBECOM 2017 - 2017 IEEE Global Communications Conference
◽
10.1109/glocom.2017.8254520
◽
2017
◽
Cited By ~ 1
Author(s):
Alex Ramos
◽
Breno Aquino
◽
Marcella Lazar
◽
Raimir Holanda Filho
◽
Joel J. P. C. Rodrigues
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Security Analysis
◽
Quantitative Model
◽
Wireless Sensor
◽
Dynamic Security
◽
Dynamic Security Analysis
Download Full-text
A generalized shell for dynamic security analysis in operations planning
IEEE Transactions on Power Systems
◽
10.1109/59.260888
◽
1993
◽
Vol 8
(3)
◽
pp. 1098-1106
◽
Cited By ~ 27
Author(s):
R.J. Marceau
◽
R. Mailhot
◽
F.D. Galiana
Keyword(s):
Security Analysis
◽
Operations Planning
◽
Dynamic Security
◽
Dynamic Security Analysis
Download Full-text
Avatar: A Framework to Support Dynamic Security Analysis of Embedded Systems’ Firmwares
Proceedings 2014 Network and Distributed System Security Symposium
◽
10.14722/ndss.2014.23229
◽
2014
◽
Cited By ~ 88
Author(s):
Jonas Zaddach
◽
Luca Bruno
◽
Aurélien Francillon
◽
Davide Balzarotti
Keyword(s):
Embedded Systems
◽
Security Analysis
◽
Dynamic Security
◽
Dynamic Security Analysis
Download Full-text
Dynamic security analysis of group key agreement protocol
IEE Proceedings - Communications
◽
10.1049/ip-com:20045193
◽
2005
◽
Vol 152
(2)
◽
pp. 134
◽
Cited By ~ 3
Author(s):
H. Sun
◽
D.D. Lin
Keyword(s):
Key Agreement
◽
Security Analysis
◽
Group Key
◽
Group Key Agreement
◽
Key Agreement Protocol
◽
Dynamic Security
◽
Dynamic Security Analysis
◽
Group Key Agreement Protocol
Download Full-text
Contingency Ranking for Dynamic Security Analysis Using a Trigonometric Based Index
2018 IEEE PES Transmission & Distribution Conference and Exhibition - Latin America (T&D-LA)
◽
10.1109/tdc-la.2018.8511662
◽
2018
◽
Author(s):
Felix Rafael Segundo Sevilla
◽
Petr Korba
◽
Emilio Barocio
Keyword(s):
Security Analysis
◽
Dynamic Security
◽
Contingency Ranking
◽
Dynamic Security Analysis
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close