Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Thomas Richard McEvoy"'
Publikováno v:
Complex Systems Informatics and Modeling Quarterly; No 18 (2019): Complex Systems Informatics and Modeling Quarterly; 47-64
Complex Systems Informatics and Modeling Quarterly, Vol 0, Iss 18, Pp 47-64 (2019)
Complex Systems Informatics and Modeling Quarterly, Vol 0, Iss 18, Pp 47-64 (2019)
Cyber security risks are socio-technical in nature. They result not just from technical vulnerabilities but also, more fundamentally, from the degradation of working practices over time – which move an organization across the boundary of secure pra
Publikováno v:
Critical Information Infrastructures Security ISBN: 9783319316635
CRITIS
CRITIS
Oil rig systems are frequently assumed to be isolated from external networks, securing them from malicious software attacks. Integrated operations and media and device mobility undermine this assumption. A successful attack on a drilling operation co
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::dfc04dafe5158d18de7f1b44708f9529
https://doi.org/10.1007/978-3-319-31664-2_12
https://doi.org/10.1007/978-3-319-31664-2_12
Publikováno v:
Critical Information Infrastructures Security ISBN: 9783642414848
CRITIS
CRITIS
Critical infrastructure systems are distributed environments in which the mixture of technologies and interdependencies between physical and logical components lead to complex interactions. Calculating the possible impacts of attacks and the success
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a1ea2b9e66493b43ae80702c82c7ee5c
https://doi.org/10.1007/978-3-642-41485-5_15
https://doi.org/10.1007/978-3-642-41485-5_15
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642414756
CRITIS
CRITIS
Supervisory control and data acquisition (SCADA) systems form a vital part of the critical infrastructure. Such systems are subject to sophisticated attacks by subverted processes which can manipulate message content or forge authentic messages, unde
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b07820f6002922800b638e47e0169e5d
https://doi.org/10.1007/978-3-642-41476-3_6
https://doi.org/10.1007/978-3-642-41476-3_6
Publikováno v:
Critical Infrastructure Protection VI ISBN: 9783642357633
Critical Infrastructure Protection
IFIP Advances in Information and Communication Technology
6th International Conference on Critical Infrastructure Protection (ICCIP)
6th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2012, Washington, DC, United States. pp.99-109, ⟨10.1007/978-3-642-35764-0_8⟩
Critical Infrastructure Protection
IFIP Advances in Information and Communication Technology
6th International Conference on Critical Infrastructure Protection (ICCIP)
6th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2012, Washington, DC, United States. pp.99-109, ⟨10.1007/978-3-642-35764-0_8⟩
Part 2: CONTROL SYSTEMS SECURITY; International audience; Defensive actions in critical infrastructure environments will increasingly require automated agents to manage the complex, dynamic interactions that occur between operators and malicious acto
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::439380b03914fc2c22100bd125ec3c13
https://doi.org/10.1007/978-3-642-35764-0_8
https://doi.org/10.1007/978-3-642-35764-0_8
Publikováno v:
Critical Information Infrastructures Security ISBN: 9783642216930
CRITIS
CRITIS
Conventional adversary models used in the analysis of cryptographic protocols such as the Dolev-Yao model and variants rely on a simple communication model in which an adversary fully participates in network communication. In the case of control (sup
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::131eb7bccf8c8d9e4ab013fcfe5f5d3d
https://doi.org/10.1007/978-3-642-21694-7_8
https://doi.org/10.1007/978-3-642-21694-7_8
Publikováno v:
Critical Infrastructure Protection V ISBN: 9783642248634
Critical Infrastructure Protection
Critical Infrastructure Protection
Industrial control systems are a vital part of the critical infrastructure. The potentially large impact of a failure makes them attractive targets for adversaries. Unfortunately, simplistic approaches to intrusion detection using protocol analysis o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::14de4d3a18f8905289f863dad596cae3
https://doi.org/10.1007/978-3-642-24864-1_4
https://doi.org/10.1007/978-3-642-24864-1_4
Publikováno v:
2010 Fifth International Conference on Systems.
The specification, verification, and validation of concurrent systems pose a number of challenges that are increasingly commonplace as multi-core and multi-processor systems are becoming ubiquitous. Any such system, particularly when actively exploit
Publikováno v:
Information Security, Practice and Experience ISBN: 9783642128264
ISPEC
ISPEC
Attack and intrusion detection on host systems is both a last line of defence and provides substantially more detail than other sensor types. However, any host-based sensor is likely to be a primary target for adversaries to ensure concealment and ev
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e248645bfb18f9563b0eb28958f86f08
https://doi.org/10.1007/978-3-642-12827-1_11
https://doi.org/10.1007/978-3-642-12827-1_11
Publikováno v:
Critical Infrastructure Protection IV ISBN: 9783642168055
Critical Infrastructure Protection
Critical Infrastructure Protection
Modern process control systems are increasingly vulnerable to subversion. Attacks that directly target production processes are difficult to detect because signature-based approaches are not well-suited to the unique requirements of process control s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::44b8be34ff540435adfe36fd93aa5776
https://doi.org/10.1007/978-3-642-16806-2_6
https://doi.org/10.1007/978-3-642-16806-2_6