Zobrazeno 1 - 10
of 27
pro vyhledávání: '"Aida Omerovic"'
Publikováno v:
Information Systems and Technologies ISBN: 9783031048289
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fcbdc8f05ad309a02f044b8a8be550ef
https://doi.org/10.1007/978-3-031-04829-6_34
https://doi.org/10.1007/978-3-031-04829-6_34
Autor:
Aida Omerovic, Maritta Heisel
Publikováno v:
Communications in Computer and Information Science ISBN: 9783030853464
QUATIC
QUATIC
We present a novel approach for the identification of risks for IT-based systems, where we base risk identification on the system architecture, in particular, the architectural principles a system is built on. Such principles can be expressed as arch
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e6d4522fabe59eb9ffcaf2560e84a04e
https://www.scopus.com/inward/record.url?partnerID=HzOxMe3b&origin=inward&scp=85115238343
https://www.scopus.com/inward/record.url?partnerID=HzOxMe3b&origin=inward&scp=85115238343
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030415679
CRiSIS
CRiSIS
We have in an earlier study proposed a set of requirements and an approach to identification and modelling of cybersecurity risks and their impacts on safety, within the context of smart power grids. The approach, which consisted of a process and a m
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::62925352a7771bf9ef98141e2968931e
https://doi.org/10.1007/978-3-030-41568-6_2
https://doi.org/10.1007/978-3-030-41568-6_2
Publikováno v:
Cloud Computing and Services Science-9th International Conference, CLOSER 2019, Heraklion, Crete, Greece, May 2–4, 2019, Revised Selected Papers
Communications in Computer and Information Science
Communications in Computer and Information Science-Cloud Computing and Services Science
Communications in Computer and Information Science ISBN: 9783030494315
CLOSER (Selected Papers)
Communications in Computer and Information Science
Communications in Computer and Information Science-Cloud Computing and Services Science
Communications in Computer and Information Science ISBN: 9783030494315
CLOSER (Selected Papers)
Data under open licenses and in reusable formats, often referred to as “open data”, is increasingly being made accessible by both public and private actors. Government institutions, municipalities, private companies and entrepreneurs are among th
Publikováno v:
COMPLEXIS
Scopus-Elsevier
Scopus-Elsevier
Power grids are undergoing a digital transformation are therefore becoming increasingly complex. As a result of this they are also becoming vulnerable in new ways. With this development come also numerous risks. Cybersecurity is therefore becoming cr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::03656c3f7642f25e4e8a63addae4b031
http://hdl.handle.net/11250/2634397
http://hdl.handle.net/11250/2634397
Publikováno v:
CLOSER
Proceedings of the 9th International Conference on Cloud Computing and Services Science
Proceedings of the 9th International Conference on Cloud Computing and Services Science
Data under open licenses and in reusable formats, often referred to as ”open data”, is increasingly being made accessible by both public and private actors. Government institutions, municipalities, private companies and entrepreneurs are among th
Publikováno v:
Communications in Computer and Information Science ISBN: 9783030225582
ENASE (Selected Papers)
ENASE (Selected Papers)
Security is of great importance for software intensive systems. Security incidents become more and more frequent in the last few years. Such incidents can lead to substantial damage, not only financially, but also in term of reputation loss. The secu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cbb3eeecc419e78a97a3a5287c06a84c
https://www.scopus.com/inward/record.url?partnerID=HzOxMe3b&origin=inward&scp=85069208393
https://www.scopus.com/inward/record.url?partnerID=HzOxMe3b&origin=inward&scp=85069208393
Publikováno v:
ENASE
Security is of great importance for many software systems. The security of a software system can be compromised by threats, which may harm assets with a certain likelihood, thus constituting a risk. All such risks should be identified, and unacceptab
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8ce140aae8aa48ab10977515929f5504
https://www.scopus.com/inward/record.url?partnerID=HzOxMe3b&origin=inward&scp=85051972358
https://www.scopus.com/inward/record.url?partnerID=HzOxMe3b&origin=inward&scp=85051972358
Publikováno v:
Lecture Notes in Computer Science
16th International Conference on Entertainment Computing (ICEC)
16th International Conference on Entertainment Computing (ICEC), Sep 2017, Tsukuba City, Japan. pp.157-168, ⟨10.1007/978-3-319-66715-7_16⟩
Entertainment Computing – ICEC 2017 ISBN: 9783319667140
ICEC
16th International Conference on Entertainment Computing (ICEC)
16th International Conference on Entertainment Computing (ICEC), Sep 2017, Tsukuba City, Japan. pp.157-168, ⟨10.1007/978-3-319-66715-7_16⟩
Entertainment Computing – ICEC 2017 ISBN: 9783319667140
ICEC
Children spend numerous hours on the Internet daily. While online, they meet a great number of opportunities as well as risks. Of these risks, cyber bullying and privacy violations are of major concern, in addition to exploitation and child pornograp
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1892c131d7a9b93ac6fc8ee10f32455f
https://hal.inria.fr/hal-01771244/document
https://hal.inria.fr/hal-01771244/document