ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Education
Social Sciences
Technology
Computing
Computing
Communication
Law
Architecture and Urbanism
Literature
Research
all records (73)

Languages
English
Spanish
Portuguese
German
French

Countries
Indonesia
USA
Brazil
Ukraine
Spain
South Africa
Canada
Turkey, Turkish Republic
Germany
Romania
all records (72)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
4.897  Articles
1 of 491 pages  |  10  records  |  more records»
Until recently, Industrial Automation and Control Systems (IACS) were largely isolated from corporate systems by means of proprietary protocols, which facilitated their protection against cyber-attacks under the principle of security through obscurity. Ho... see more

The fact that modern Networked Industrial Control Systems (NICS) depend on Information and Communication Technologies (ICT), is well known. Although many studies have focused on the security of SCADA systems, today we still lack the proper understanding o... see more

This paper tries to discuss the development of cyberwar that threatens many countries by referring to the example of the North Korean cyberattack against the United States (US). Cyberattack is a relatively new phenomenon that many countries have not been ... see more

To protect informational systems against cyber threats (attacks) risks must be constantly evaluated and assessed their existence in the global information space affect the confidentiality, integrity and availability of information resources. Upon the anal... see more

Context. The topical approaches to preventive estimations and mathematical modeling of cyber attacks processes and supply of external technological informational threats were considered, which may be directed on the physical security system of modern nucl... see more

A Security Operations Center (SOC) is a central technical level unit responsible for monitoring, analyzing, assessing, and defending an organization’s security posture on an ongoing basis. The SOC staff works closely with incident response teams, se... see more

The existing power grid is going through a massive transformation. Smart grid technology is a radical approach for improvisation in prevailing power grid. Integration of electrical and communication infrastructure is inevitable for the deployment of Smart... see more

In this paper, we present a comprehensive study of smart grid security against cyber-physical attacks on its distinct functional components. We discuss: (1) a function-based methodology to evaluate smart grid resilience against cyber-physical attacks; (2)... see more

Nowadays, electronic applications are being adopted instead of many traditional processes in data and information management that use Internet technology as a transmission medium. Therefore, these data and information suffer from different types of attack... see more

1 of 491 pages  |  10  records  |  more records»