{"_id":"SuDdnJg9SXyAZxPrz","bibbaseid":"armando-merlo-verderame-securityconsiderationsrelatedtotheuseofmobiledevicesintheoperationofcriticalinfrastructures-2014","downloads":0,"creationDate":"2016-08-26T09:24:46.789Z","title":"Security considerations related to the use of mobile devices in the operation of critical infrastructures","author_short":["Armando, A.","Merlo, A.","Verderame, L."],"year":2014,"bibtype":"article","biburl":"https://dl.dropboxusercontent.com/u/1703583/BiblioLab.bib","bibdata":{"bibtype":"article","type":"article","author":[{"propositions":[],"lastnames":["Armando"],"firstnames":["A."],"suffixes":[]},{"propositions":[],"lastnames":["Merlo"],"firstnames":["A."],"suffixes":[]},{"propositions":[],"lastnames":["Verderame"],"firstnames":["L."],"suffixes":[]}],"title":"Security considerations related to the use of mobile devices in the operation of critical infrastructures","journal":"International Journal of Critical Infrastructure Protection","year":"2014","volume":"7","number":"4","pages":"247-256","doi":"10.1016/j.ijcip.2014.10.002","url":"https://www.scopus.com/inward/record.uri?eid=2-s2.0-84918840541&partnerID=40&md5=3853161f96bfbdf36d63264b5ea58b27","document_type":"Article","source":"Scopus","bibtex":"@ARTICLE{Armando2014247,\nauthor={Armando, A., Merlo, A., Verderame, L.},\ntitle={Security considerations related to the use of mobile devices in the operation of critical infrastructures},\njournal={International Journal of Critical Infrastructure Protection},\nyear={2014},\nvolume={7},\nnumber={4},\npages={247-256},\ndoi={10.1016/j.ijcip.2014.10.002},\nurl={https://www.scopus.com/inward/record.uri?eid=2-s2.0-84918840541&partnerID=40&md5=3853161f96bfbdf36d63264b5ea58b27},\ndocument_type={Article},\nsource={Scopus},\n}\n\n","author_short":["Armando, A.","Merlo, A.","Verderame, L."],"key":"Armando2014247","id":"Armando2014247","bibbaseid":"armando-merlo-verderame-securityconsiderationsrelatedtotheuseofmobiledevicesintheoperationofcriticalinfrastructures-2014","role":"author","urls":{"Paper":"https://www.scopus.com/inward/record.uri?eid=2-s2.0-84918840541&partnerID=40&md5=3853161f96bfbdf36d63264b5ea58b27"},"downloads":0},"search_terms":["security","considerations","related","use","mobile","devices","operation","critical","infrastructures","armando","merlo","verderame"],"keywords":["dblp"],"authorIDs":["57c00ade5abfdd4d540000c7","57c00b7c5abfdd4d540000cb"],"dataSources":["EQov9rEvkmMf5P4ah"]}