Zobrazeno 1 - 10
of 31
pro vyhledávání: '"Nabin Chowdhury"'
Autor:
Nabin Chowdhury
Publikováno v:
Signals, Vol 2, Iss 4, Pp 803-819 (2021)
As digital instrumentation in Nuclear Power Plants (NPPs) is becoming increasingly complex, both attack vectors and defensive strategies are evolving based on new technologies and vulnerabilities. Continued efforts have been made to develop a variety
Externí odkaz:
https://doaj.org/article/d0ed6eddd2c14b3497eddebe5339ddad
Autor:
Georgios Kavallieratos, Nabin Chowdhury, Sokratis Katsikas, Vasileios Gkioulos, Stephen Wolthusen
Publikováno v:
Future Internet, Vol 11, Iss 10, p 207 (2019)
The development and deployment of highly dynamic, cyber+connected operational environments, such as smart homes, smart cities, and smart transportation systems, is increasing. The security analysis of such dynamic environments necessitates the use of
Externí odkaz:
https://doaj.org/article/18fc16ae78da420db172825f29e5c517
The security of the communication systems, digital services and functionalities of Critical Infrastructures (CI) is more important now than ever. Many of today’s energy providing infrastructures such as Smart Grids and Nuclear Power Plants rely on
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b147a6b0fe8e7fe04bb88bf9aa885fb3
https://doi.org/10.21203/rs.3.rs-2072381/v2
https://doi.org/10.21203/rs.3.rs-2072381/v2
The security of the communication systems, digital services and functionalities of Critical Infrastructures (CI) is more important now than ever. Many of today's energy providing infrastructures such as Smart Grids and Nuclear Power Plants rely on di
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::99cf76d2e25365f4804812e9a5b65be5
https://doi.org/10.21203/rs.3.rs-2072381/v1
https://doi.org/10.21203/rs.3.rs-2072381/v1
Autor:
Vasileios Gkioulos, Nabin Chowdhury
Publikováno v:
Information and Computer Security
Purpose The purpose of this paper can be encapsulated in the following points: identify the research papers published on the topic: competencies and skills necessary for critical infrastructure (CI) cyber-security (CS) protection; determine main focu
Autor:
Nabin Chowdhury, Vasileios Gkioulos
Current enterprise needs for skilled cyber- security (CS) professionals have prompted the development of diverse CS training programs and of ferings. It has been noted however that even though enterprise staff is now more aware of security threats, t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::861167b40875e4cd850c2f3850c43baa
https://doi.org/10.21203/rs.3.rs-1994354/v1
https://doi.org/10.21203/rs.3.rs-1994354/v1
Autor:
Nabin Chowdhury, Vasileios Gkioulos
Publikováno v:
Computer Science Review
Introduction: Today, cyber-security curricula are available across educational types and levels, including a vast array of programs and modules tailored to specific sectors of industry and audiences, to allow more targeted delivery of knowledge. None
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5aa0bbd1662baaab9bc98b8086e0ed55
https://hdl.handle.net/11250/2734276
https://hdl.handle.net/11250/2734276
Autor:
Nabin Chowdhury
Publikováno v:
Computer Security ISBN: 9783030643294
CyberICPS/SECPRE/ADIoT@ESORICS
CyberICPS/SECPRE/ADIoT@ESORICS
The adoption of new means of communication in the form of internet-based communication, power line communication, wireless communication and other communication protocols have allowed smart grids many additional functionalities over traditional power
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::dcb48a89950d8ab4fbc35510137c3196
https://doi.org/10.1007/978-3-030-64330-0_4
https://doi.org/10.1007/978-3-030-64330-0_4
Publikováno v:
Computers & security
Today, cybersecurity training is commonplace in both large companies and Small & Medium Enterprise (SME). Nonetheless, the effectiveness of many of the current training offerings is put into question by reports of increasing successful cyber-attacks.
Publikováno v:
Proceedings of the Water Environment Federation. 2018:40-46