Results 91 to 100 of about 2,352,522 (144)

Redefining Malware Sandboxing: Enhancing Analysis Through Sysmon and ELK Integration

open access: yesIEEE Access
In cybersecurity, adversaries employ a myriad of tactics to evade detection and breach defenses. Malware remains a formidable weapon in their arsenal. To counter this threat, researchers unceasingly pursue dynamic analysis, which aims to comprehend and ...
Rasmi-Vlad Mahmoud   +3 more
doaj   +1 more source

SECURITY ROLE OF INTELLIGENT TRANSPORTATION SYSTEM

open access: yes, 2012
The paper provides an overview of security problems in intelligent transport systems. The basic functional areas of intelligent transport systems are shown. Some main components of ITS directly related to security technology are described. In cases of major traffic or other security incidents it is very important to manage events dynamically in real ...
Mandžuka, Sadko, Škorput, Pero
openaire   +1 more source

Autonomic Management of System of Systems Security

open access: yes, 2021
The digitalization of manufacturing industry and the profound reliance on interconnected System of Systems (SoS) is demanding for innovative solutions that can handle production processes, while making use of the new data that is being generated by various connected devices.
openaire   +1 more source

Security of eGovernment Systems

open access: yesTATuP - Zeitschrift für Technikfolgenabschätzung in Theorie und Praxis, 2013
Weber, A.   +3 more
openaire   +3 more sources

Security of Multimedia Systems

open access: yesThe Journal of the Institute of Image Information and Television Engineers, 2002
Kenji Naemura   +2 more
openaire   +2 more sources

Cyber–Physical System Security of Distribution Systems

Foundations and Trends® in Electric Energy Systems, 2021
Threats of cyberattacks targeting the electric power grid have been increasing in recent years. The consequence of cyber incidents on the power grid includes equipment damage, cascading events, large-scale power outages, and disruption of market functions.
Liu, Chen-Ching (author)   +7 more
openaire   +3 more sources

Security of railway EOT systems

Proceedings of the 2005 ASME/IEEE Joint Rail Conference, 2005., 2005
Most railway trains use an end of train (EOT) device to communicate from the front of the train to the end of the train. The wireless protocol for these communications is not secure. This would allow a hostile person to initiate at emergency braking event with most freight and passenger trains. This paper examines the vulnerability and recommends a new
Paul V. Craven, Stephen Craven
openaire   +1 more source

Assessment of security systems complex networks security

2014 Dynamics of Systems, Mechanisms and Machines (Dynamics), 2014
The article describes modern approaches to management of safety of activity of the person of systems on various objects. Actual problems of operation of similar complexes are formulated. A main objective of article is consideration of problems of collection of information about a condition of objects and creations of algorithms of identification of ...
S. Yu. Iskhakov   +2 more
openaire   +1 more source

Security of Water Infrastructure Systems

2009
This paper formulates the security problem in critical water infrastructure systems for diagnosing quality faults. The proposed scheme is based on the discretized equations of advection and reaction of contaminant concentrations in pipes and tanks, expressed in a state-space form.
Eliades, D. G.   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy