Entry Macwan:2004:AIA from bstj2000.bib
Last update: Sun Oct 15 02:05:00 MDT 2017
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Macwan:2004:AIA,
author = "Anil Macwan",
title = "Approach for identification and analysis of human
vulnerabilities in protecting telecommunications
infrastructure",
journal = j-BELL-LABS-TECH-J,
volume = "9",
number = "2",
pages = "85--89",
month = "Summer",
year = "2004",
CODEN = "BLTJFD",
DOI = "https://doi.org/10.1002/bltj.20027",
ISSN = "1089-7089 (print), 1538-7305 (electronic)",
ISSN-L = "1089-7089",
bibdate = "Fri Nov 26 17:31:34 MST 2010",
bibsource = "http://www.math.utah.edu/pub/tex/bib/bstj2000.bib",
acknowledgement = ack-nhfb,
fjournal = "Bell Labs Technical Journal",
journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
onlinedate = "7 Jul 2004",
}
Related entries
- analysis,
5(4)97,
7(3)83,
9(4)133,
10(1)175,
10(1)181,
10(4)101,
11(2)157,
11(3)21,
11(3)57,
11(3)83,
11(4)53,
11(4)307,
12(1)77,
12(4)21,
12(4)195,
13(4)97,
14(3)127
- approach,
7(1)47,
9(2)51,
9(3)39,
10(3)129,
11(1)5,
11(1)79,
11(3)161,
12(3)121,
12(4)67,
13(3)71,
14(1)203,
14(1)219,
14(2)5
- identification,
12(3)139
- infrastructure,
8(4)115,
8(4)153,
9(2)1,
9(2)59,
11(3)57,
11(3)73,
12(2)63,
12(4)127,
13(2)105,
13(3)111,
13(4)257,
14(2)39
- protecting,
9(2)1,
13(1)35
- telecommunication,
5(4)157,
8(3)97,
8(4)203,
9(2)51,
9(2)91,
9(2)107,
9(2)125,
11(3)173,
14(3)21
- vulnerability,
8(4)173,
9(2)189,
12(3)7,
12(3)79