Cyber Resilience Self-Assessment Tool (CR-SAT) for SMEs
On the current environment, companies face risks and threats to the systems they need to operate often known as cyber threats. Most of these companies are small and medium-sized enterprises (SMEs) and they are exposed to these cyber threats.
Juan Francisco Carias +3 more
doaj +1 more source
Systematic Approach to Cyber Resilience Operationalization in SMEs
The constantly evolving cyber threat landscape is a latent problem for today's companies. This is especially true for the Small and Medium-sized Enterprises (SMEs) because they have limited resources to face the threats but, as a group, represent an ...
Juan Francisco Carias +4 more
doaj +1 more source
Cyber Resilience Progression Model
Due to the hazardous current cyber environment, cyber resilience is more necessary than ever. Companies are exposed to an often-ignored risk of suffering a cyber incident. This places cyber incidents as one of the main risks for companies in the past few
Juan F. CarĂas +3 more
doaj +1 more source
Towards the cognitive and psychological perspectives of crowd behaviour: a vision-based analysis
Smart and proactive surveillance of crowds has turned up into greater importance in recent years due to the increase in urban population and immutable crowd disasters. Although the behaviours that emerged in a crowd are often unpredictable, researches in
Elizabeth B. Varghese, Sabu M. Thampi
doaj +1 more source
This paper presents a computational approach to evaluate the resilience of electricity Distribution Networks (DNs) to cyber-physical failures. In our model, we consider an attacker who targets multiple DN components to maximize the loss of the DN ...
Amin, Saurabh +2 more
core +1 more source
STOP-IT: strategic, tactical, operational protection of water infrastructure against cyberphysical threats [PDF]
Water supply and sanitation infrastructures are essential for our welfare, but vulnerable to several attack types facilitated by the ever-changing landscapes of the digital world.
Bonet Gil, Enrique +2 more
core +1 more source
Security-Informed Safety: Supporting Stakeholders with Codes of Practice [PDF]
Codes of practice provide principles and guidance on how organizations can incorporate security considerations into their safety engineering lifecycle and become more security ...
Bishop, P. G. +3 more
core +1 more source
Enhancing cyber-resilience in integrated energy system scheduling with demand response using deep reinforcement learning [PDF]
Optimally scheduling multi-energy flow is an effective method to utilize renewable energy sources (RES) and improve the stability and economy of integrated energy systems (IES). However, the stable demand-supply of IES faces challenges from uncertainties
Yang Li +5 more
semanticscholar +1 more source
Cyber-Resilience Evaluation of Cyber-Physical Systems [PDF]
11 pages, 2 figures, 6 ...
Segovia, Mariana +3 more
openaire +2 more sources
STUDY OF THE INFLUENCE OF LEGAL SECURITY AND CYBER INTELLIGENCE CAPACITY ON STRENGTHENING GOVERNANCE OF CYBER DEFENSE IN INDONESIA [PDF]
Stakeholders in cyber intelligence and cyber defense systems are believed to play a significant role in enhancing national resilience. The involvement of intelligence entities in the cyber domain, along with institutional and governance aspects of cyber ...
Purnomo W.P. +3 more
doaj +1 more source

