Results 91 to 100 of about 2,352,522 (144)
Redefining Malware Sandboxing: Enhancing Analysis Through Sysmon and ELK Integration
In cybersecurity, adversaries employ a myriad of tactics to evade detection and breach defenses. Malware remains a formidable weapon in their arsenal. To counter this threat, researchers unceasingly pursue dynamic analysis, which aims to comprehend and ...
Rasmi-Vlad Mahmoud +3 more
doaj +1 more source
SECURITY ROLE OF INTELLIGENT TRANSPORTATION SYSTEM
The paper provides an overview of security problems in intelligent transport systems. The basic functional areas of intelligent transport systems are shown. Some main components of ITS directly related to security technology are described. In cases of major traffic or other security incidents it is very important to manage events dynamically in real ...
Mandžuka, Sadko, Škorput, Pero
openaire +1 more source
Autonomic Management of System of Systems Security
The digitalization of manufacturing industry and the profound reliance on interconnected System of Systems (SoS) is demanding for innovative solutions that can handle production processes, while making use of the new data that is being generated by various connected devices.
openaire +1 more source
Security of eGovernment Systems
Weber, A. +3 more
openaire +3 more sources
Security of Multimedia Systems
Kenji Naemura +2 more
openaire +2 more sources
Management of secure systems and security within Open Systems Interconnection (OSI)
openaire +8 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Cyber–Physical System Security of Distribution Systems
Foundations and Trends® in Electric Energy Systems, 2021Threats of cyberattacks targeting the electric power grid have been increasing in recent years. The consequence of cyber incidents on the power grid includes equipment damage, cascading events, large-scale power outages, and disruption of market functions.
Liu, Chen-Ching (author) +7 more
openaire +3 more sources
Security of railway EOT systems
Proceedings of the 2005 ASME/IEEE Joint Rail Conference, 2005., 2005Most railway trains use an end of train (EOT) device to communicate from the front of the train to the end of the train. The wireless protocol for these communications is not secure. This would allow a hostile person to initiate at emergency braking event with most freight and passenger trains. This paper examines the vulnerability and recommends a new
Paul V. Craven, Stephen Craven
openaire +1 more source
Assessment of security systems complex networks security
2014 Dynamics of Systems, Mechanisms and Machines (Dynamics), 2014The article describes modern approaches to management of safety of activity of the person of systems on various objects. Actual problems of operation of similar complexes are formulated. A main objective of article is consideration of problems of collection of information about a condition of objects and creations of algorithms of identification of ...
S. Yu. Iskhakov +2 more
openaire +1 more source
Security of Water Infrastructure Systems
2009This paper formulates the security problem in critical water infrastructure systems for diagnosing quality faults. The proposed scheme is based on the discretized equations of advection and reaction of contaminant concentrations in pipes and tanks, expressed in a state-space form.
Eliades, D. G. +3 more
openaire +2 more sources

