Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Gunther Pernul"'
Publikováno v:
IEEE Access, Vol 12, Pp 93294-93304 (2024)
Smart manufacturing uses data generated within manufacturing systems to provide intelligent and flexible control of production processes. To realize the vision of smart manufacturing, digital twins play a key role. As a virtual representation of any
Externí odkaz:
https://doaj.org/article/b1eb8d26563a4ca48186e7bf4425fcf4
Publikováno v:
IEEE Access, Vol 11, Pp 86872-86894 (2023)
System for Cross-domain Identity Management (SCIM) is a schema and protocol to exchange identity data across cloud-based applications utilizing a Representational State Transfer (REST) Application Programming Interface (API). Since it quickly gained
Externí odkaz:
https://doaj.org/article/ca700f18db654ecda6713f4b12698529
Publikováno v:
IEEE Access, Vol 8, Pp 227756-227779 (2020)
Since the introduction of Security Operations Centers (SOCs) around 15 years ago, their importance has grown significantly, especially over the last five years. This is mainly due to the paramount necessity to prevent major cyber incidents and the re
Externí odkaz:
https://doaj.org/article/eaa948789d7e4aa08a212e296853ca94
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 1, Iss 3, Pp 519-538 (2021)
The rapid advancements of technology related to the Internet of Things and Cyber-Physical Systems mark an ongoing industrial revolution. Digital Twins and Augmented Reality play a significant role in this technological advancement. They are highly co
Externí odkaz:
https://doaj.org/article/4d6c1d2c340543a8ae1b4339101597b9
Autor:
Philip Empl, Günther Pernul
Publikováno v:
Information, Vol 14, Iss 2, p 95 (2023)
Although there are numerous advantages of the IoT in industrial use, there are also some security problems, such as insecure supply chains or vulnerabilities. These lead to a threatening security posture in organizations. Security analytics is a coll
Externí odkaz:
https://doaj.org/article/b15edac050ba41f1a80ed68a1ea362e7
Publikováno v:
Cybersecurity, Vol 2, Iss 1, Pp 1-15 (2019)
Abstract Humans are commonly seen as the weakest link in corporate information security. This led to a lot of effort being put into security training and awareness campaigns, which resulted in employees being less likely the target of successful atta
Externí odkaz:
https://doaj.org/article/92e02c947260486fb0770df0bad1c294
Publikováno v:
Cybersecurity, Vol 1, Iss 1, Pp 1-19 (2018)
Abstract The ever-increasing amount of major security incidents has led to an emerging interest in cooperative approaches to encounter cyber threats. To enable cooperation in detecting and preventing attacks it is an inevitable necessity to have stru
Externí odkaz:
https://doaj.org/article/cd1a5510aeb649b2b3cbef687fd74246
Publikováno v:
Cybersecurity, Vol 2, Iss 1, Pp 1-1 (2019)
In the original publication of this article (Vielberth et al. 2019), the author list was not completed.
Externí odkaz:
https://doaj.org/article/6d0a9c5a52e843a8af2c46e6e64ff718
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.