Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Marko Schuba"'
Publikováno v:
Digitalisierungs-und Informationsmanagement ISBN: 9783662637579
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a3fa9370e5283b5e8c86ffb8812cf3da
https://doi.org/10.1007/978-3-662-63758-6_15
https://doi.org/10.1007/978-3-662-63758-6_15
Publikováno v:
2021 International Conference on Electrical, Computer and Energy Technologies (ICECET).
Given the tremendous success of the Internet of Things in interconnecting consumer devices, we observe a natural trend to likewise interconnect devices in industrial settings, referred to as Industrial Internet of Things or Industry 4.0. While this c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2d2b3fd289941cc8928e80d2d8fe8152
Publikováno v:
ARES
The proliferation of the Internet of Things (IoT) in the context of smart homes entails new security risks threatening the privacy and safety of end users. In this paper, we explore the design space of in-network security for smart home networks, whi
Publikováno v:
DEStech Transactions on Computer Science and Engineering.
ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the s
Publikováno v:
DEStech Transactions on Computer Science and Engineering.
Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straigh
Publikováno v:
ICISSP
Tatort Unternehmen - Interne Ermittlungen - Criminal Investigations - beeindruckende Begriffe aus der Tagespresse, die in der betrieblichen Praxis jedoch vor allem eins erfordern: viel Sachkunde und routiniertes Vorgehen. Welche taktischen Möglichke
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1d7064b80238ece89860bab18316052a
https://doi.org/10.37307/b.978-3-503-16531-5
https://doi.org/10.37307/b.978-3-503-16531-5
Publikováno v:
ARES
Cold boot attacks provide a means to obtain a dump of a computer's volatile memory even if the machine is locked. Such a dump can be used to reconstruct hard disk encryption keys and get access to the content of Bit locker or True crypt encrypted dri