Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Gerhard Hansch"'
Publikováno v:
ACM Transactions on Cyber-Physical Systems. 7:1-25
Security risk assessment is an important task in systems engineering. It is used to derive security requirements for a secure system design and to evaluate design alternatives as well as vulnerabilities. Security risk assessment is also a complex and
Publikováno v:
CSCS
Security is a cross-cutting issue in the automotive development process. The nature of cross-cutting issues demands constant coordination between different stakeholders. Changes in the vehicle functionalities lead to reoccurring security analysis ste
Publikováno v:
ETFA
Establishing adequate cybersecurity for their operational technology (OT) is an existential challenge for manufacturing enterprises. Domain-specific security standards should provide essential support in this challenge. However, they cannot be implem
Publikováno v:
Proceedings of the 5th on Cyber-Physical System Security Workshop.
The emerging Industrial Internet of Things (IIoT) is characterized by heterogeneous systems, loose topologies, cross-company data flows, changing entities, and high cybersecurity requirements. This development makes a sound security architecture an e
Publikováno v:
IDAACS
Network traffic captures are necessary for a variety of security applications like identification of malicious patterns or training of intrusion detection systems. While monitoring of enterprise networks is common practice, it is rarely done for indu
Publikováno v:
ICS-CSR
Incomplete information about connectivity and functionality of elements of networked control systems is a challenging issue in applying model-based security analysis in practice. This issue can be addressed by modelling techniques providing inherent
Publikováno v:
Scopus-Elsevier
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::3f38315b596d7c205bbc5518ac3721d5
http://www.scopus.com/inward/record.url?eid=2-s2.0-85050797563&partnerID=MN8TOARS
http://www.scopus.com/inward/record.url?eid=2-s2.0-85050797563&partnerID=MN8TOARS
Publikováno v:
Proceedings of the European Conference on Cyber Warfare & Security; 2016, p34-41, 8p, 2 Diagrams
Publikováno v:
Proceedings of the European Conference on Cyber Warfare & Security; 2018, p370-379, 10p, 5 Diagrams
Autor:
Marlies Janson, Helmut Opitz
The World Guide to Special Libraries lists about 35,000 libraries world wide categorized by more than 800 key words - including libraries of departments, institutes, hospitals, schools, companies, administrative bodies, foundations, associations and