Zobrazeno 1 - 10
of 717
pro vyhledávání: '"Attack Tree"'
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 13, Iss 1, Pp 1-27 (2024)
Abstract Serverless computing is one of the recent compelling paradigms in cloud computing. Serverless computing can quickly run user applications and services regardless of the underlying server architecture. Despite the availability of several comm
Externí odkaz:
https://doaj.org/article/2dfc586b1873477f9739857b8cfe706a
Publikováno v:
IEEE Access, Vol 12, Pp 172610-172637 (2024)
The pervasive use of AI assistant systems and machine learning-based applications in various fields and everyday life has significantly shifted. However, this shift is not without its challenges. The emergence of security threats, various attacks, an
Externí odkaz:
https://doaj.org/article/6129a1a8442e43b39adc0c5662815699
Publikováno v:
IEEE Access, Vol 11, Pp 101007-101019 (2023)
For the problems of scientificity and reliability of vulnerability quantitative assessment method based on attack tree model, we propose an improved expert decision method based on attack tree model to improve the reliability of expert decision aggre
Externí odkaz:
https://doaj.org/article/edd366a76f8a4155983f8800e3e30b43
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Information, Vol 14, Iss 12, p 639 (2023)
Safety-critical cyber-physical systems (CPSs), such as high-tech cars having cyber capabilities, are highly interconnected. Automotive manufacturers are concerned about cyber attacks on vehicles that can lead to catastrophic consequences. There is a
Externí odkaz:
https://doaj.org/article/384ca4b3f7454f60a0012d8a07e57ae8
Publikováno v:
IEEE Access, Vol 9, Pp 29827-29840 (2021)
Supply chain security is becoming an important factor in security risk analysis for modern information and communication technology (ICT) systems. As Internet of Things (IoT) devices proliferate and get adopted into critical infrastructure, the role
Externí odkaz:
https://doaj.org/article/241cfb1ea88e4e89a8e3ccd23ec0830c
Autor:
Petrică, Gabriel, Mihai, Ioan-Cosmin
Publikováno v:
International Journal of Information Security and Cybercrime (IJISC). 9(1):37-42
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=937882
Publikováno v:
Информатика и автоматизация, Vol 19, Iss 2, Pp 358-382 (2020)
An issue of the Internet of Things security which does not belong to the traditional problem of cybersecurity, as it is a local or distributed monitoring and/or monitoring of physical systems state connected via the Internet, is considered. An archit
Externí odkaz:
https://doaj.org/article/6c53721390b448f08f7757532cb72d57
Publikováno v:
Информатика и автоматизация, Vol 18, Iss 6, Pp 1333-1356 (2019)
In the current age, cyber security is an essential element of any information system. A key aspect is in the critical information infrastructure, where information security has become a top priority for information and network security experts. The i
Externí odkaz:
https://doaj.org/article/5bb71f17e3ec43fb95392ea52a9a7073
Publikováno v:
网络与信息安全学报, Vol 5, Pp 50-57 (2019)
In order to avert the drawback of traditional information flow integrity analysis on ignoring the specific system architecture and associated attack events,an integrity threat tree to quantify the integrity of the system information flow,and the cond
Externí odkaz:
https://doaj.org/article/6130fdd1bda5480e9a76d1a17db5d5eb