Results 21 to 30 of about 76,134 (287)

Cyber-Resilience Evaluation of Cyber-Physical Systems [PDF]

open access: yes2020 IEEE 19th International Symposium on Network Computing and Applications (NCA), 2020
11 pages, 2 figures, 6 ...
Segovia, Mariana   +3 more
openaire   +2 more sources

STUDY OF THE INFLUENCE OF LEGAL SECURITY AND CYBER INTELLIGENCE CAPACITY ON STRENGTHENING GOVERNANCE OF CYBER DEFENSE IN INDONESIA [PDF]

open access: yesRussian Journal of Agricultural and Socio-Economic Sciences, 2023
Stakeholders in cyber intelligence and cyber defense systems are believed to play a significant role in enhancing national resilience. The involvement of intelligence entities in the cyber domain, along with institutional and governance aspects of cyber ...
Purnomo W.P.   +3 more
doaj   +1 more source

Cyber Resilience Evaluation Using Cyber Resilience Review Framework at University XYZ

open access: yesInternational Journal of Educational Management and Innovation, 2022
Cyber resilience is about protecting data and information owned by University XYZ and adapting business processes at University XYZ to ensure service continuity when cyber threats occur. However, University XYZ never evaluates its practices to implement security and data management.
Ahmad Maulana Fikri   +2 more
openaire   +1 more source

EU cybersecurity capacity building in the Mediterranean and the Middle East [PDF]

open access: yes, 2020
Cyberthreats on the Rise The 2008 Report on the implementation of the European Security Strategy included “cybersecurity” for the first time among the priorities of the EU’s external action, stating that: “modern economies are heavily reliant on critical
Lannon, Erwoan
core  

Security-Informed Safety: Supporting Stakeholders with Codes of Practice [PDF]

open access: yes, 2018
Codes of practice provide principles and guidance on how organizations can incorporate security considerations into their safety engineering lifecycle and become more security ...
Bishop, P. G.   +3 more
core   +1 more source

Resilience Assessment of the State Estimation Software under Cyber Attacks

open access: yesE3S Web of Conferences, 2018
Taking into account Smart Grid creation, cyber security appears as critical problem. In spite of wide set of technical tools and organisational decisions, which use for protection of electrical objects against cyber attacks, it is impossible to prevent ...
Voropai Nikolai   +2 more
doaj   +1 more source

A Feedback-Driven Federated Zero-Shot Learning Framework for Adaptive Detection of Evolving Banking Malware

open access: yesIEEE Access
The rise of digital banking has increased the frequency and sophistication of banking malware attacks, highlighting the need for privacy-preserving and adaptive detection frameworks.
Nahid Ferdous Aurna   +2 more
doaj   +1 more source

Developing cyber-resilient systems :

open access: yes, 2019
NIST Special Publication (SP) 800-160, Volume 2, Revision 1, focuses on cyber resiliency engineering an emerging specialty systems engineering discipline applied in conjunction with systems security engineering and resilience engineering to develop survivable, trustworthy secure systems.
Ron Ross   +4 more
openaire   +1 more source

Cyber resilience in industrial networks: A state of the art, challenges, and future directions

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Industrial networks, and more particularly, industrial control systems (ICSs) and industrial Internet of things (IIoT), are no longer isolated environments.
Thuraya N.I. Alrumaih   +4 more
doaj   +1 more source

Extensive Review of Threat Models for DevSecOps

open access: yesIEEE Access
Amidst the rising tide of cyber threats, the software industry is gravitating toward the widespread adoption of DevSecOps as a crucial defense strategy.
S Nagasundari   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy