Zobrazeno 1 - 10
of 100
pro vyhledávání: '"Robert Lagerström"'
Publikováno v:
Complex Systems Informatics and Modeling Quarterly, Vol 0, Iss 26, Pp 55-77 (2021)
Cyber attacks on IT and OT systems can have severe consequences for individuals and organizations, from water or energy distribution systems to online banking services. To respond to these threats, attack simulations can be used to assess the cyber s
Externí odkaz:
https://doaj.org/article/ab52dafc67fd460aa9f349883312dc49
Publikováno v:
Cybersecurity, Vol 3, Iss 1, Pp 1-20 (2020)
Abstract Threat modeling is of increasing importance to IT security, and it is a complex and resource demanding task. The aim of automating threat modeling is to simplify model creation by using data that are already available. However, the collected
Externí odkaz:
https://doaj.org/article/471d30fa0f3b4f82aaff8c6ded8342e7
Publikováno v:
Complex Systems Informatics and Modeling Quarterly, Vol 0, Iss 20, Pp 20-56 (2019)
Modeling IT architecture is a complex, time consuming, and error prone task. However, many systems produce information that can be used for automating modeling. Early studies show that this is a feasible approach if we can overcome certain obstacles.
Externí odkaz:
https://doaj.org/article/42e8951dac654ad8bdc307ac8fa5384e
Publikováno v:
Complex Systems Informatics and Modeling Quarterly, Vol 0, Iss 19, Pp 75-98 (2019)
Recent contributions to information systems theory suggest that the primary role of a firm’s information technology (IT) architecture is to facilitate, and therefore ensure the continued alignment of a firm’s IT investments with a constantly chan
Externí odkaz:
https://doaj.org/article/8d8cc2a3c4cf44f38b858a3f6d1d21bc
Autor:
Ali Mohamed, Franz Wang, Ismail Butun, Junaid Qadir, Robert Lagerström, Paolo Gastaldo, Daniele D. Caviglia
Publikováno v:
Sensors, Vol 22, Iss 9, p 3498 (2022)
The Internet of Things (IoT) has disrupted the IT landscape drastically, and Long Range Wide Area Network (LoRaWAN) is one specification that enables these IoT devices to have access to the Internet. Former security analyses have suggested that the g
Externí odkaz:
https://doaj.org/article/b849f91cd80b4e6f9e10d0a83b176e44
Autor:
Alexandre Vernotte, Margus Välja, Matus Korman, Gunnar Björkman, Mathias Ekstedt, Robert Lagerström
Publikováno v:
Energy Informatics, Vol 1, Iss 1, Pp 1-41 (2018)
Abstract Background In the coming years, the increase of automation in electricity distribution grids, controlled by ICT, will bring major consequences to the cyber security posture of the grids. Automation plays an especially important role in load
Externí odkaz:
https://doaj.org/article/a1e6970f26ed43c6bcb712ea880c63be
Publikováno v:
Complex Systems Informatics and Modeling Quarterly, Vol 0, Iss 11, Pp 38-68 (2017)
The Multi-Attribute Prediction Language (MAPL), an analysis metamodel for non-functional qualities of system architectures, is introduced. MAPL features automate analysis in five non-functional areas: service cost, service availability, data accuracy
Externí odkaz:
https://doaj.org/article/c89bbef7ccd84715baa7e96c41962f67
Publikováno v:
Complex Systems Informatics and Modeling Quarterly, Vol 0, Iss 7, Pp 1-24 (2016)
Authorization and its enforcement, access control, have stood at the beginning of the art and science of information security, and remain being crucial pillar of security in the information technology (IT) and enterprises operations. Dozens of differ
Externí odkaz:
https://doaj.org/article/058babd2ece14e1b998c7460de00a0d0
Publikováno v:
Computers & Security. 130:103284
Publikováno v:
Computer Science Review. 48:100551