Big Data for Smart Grid: A Case Study

TA Taha, MK Hassan, HI Zaynal… - Big Data Analytics …, 2024 - taylorfrancis.com
This chapter gives the necessary context for understanding the big data and smart grid
projects and trials. The section begins with an explanation of both the conventional and …

[图书][B] Информационная экономика

Л Матвеева, О Чернова, А Никитаева, Е Маслюкова - 2022 - books.google.com
В учебнике, состоящем их четырех взаимосвязанных модулей, изложены
теоретические основы и прикладные аспекты становления и развития …

Collection and analysis of attack data based on honeypots deployed on the internet

E Alata, M Dacier, Y Deswarte, M Kaaâniche… - Quality of Protection …, 2006 - Springer
Abstract The CADHo project (Collection and Analysis of Data from Honeypots) is an ongoing
research action funded by the French ACI “Securiteé & Informatique”[1]. It aims at building …

[PDF][PDF] 基于可靠性理论的分布式系统脆弱性模型

冯萍慧, 连一峰, 戴英侠, 鲍旭华 - 2006 - pdfs.semanticscholar.org
对现有的脆弱性分析方法进行分析和比较, 提出基于可靠性理论的分布式系统脆弱性模型.
针对影响分布式系统安全性的各项因素进行脆弱性建模, 利用模型检验方法构造系统的脆弱性 …

Vulnerability analysis for a quantitative security evaluation

G Vache - 2009 3rd International Symposium on Empirical …, 2009 - ieeexplore.ieee.org
This paper presents the quantitative characterization of vulnerability life cycle and of exploit
creation by probability distributions. This work aims at helping the production of quantitative …

A hardware threat modeling concept for trustable integrated circuits

J Di, S Smith - 2007 IEEE Region 5 Technical Conference, 2007 - ieeexplore.ieee.org
Similar to the effects of software viruses, hardware can also be compromised by introduction
of malicious logic into circuits to cause unwanted system behaviors. This can be done by …

Joint safety and security modeling for risk assessment in cyber physical systems

S Kriaa - 2016 - theses.hal.science
Cyber physical systems (CPS) denote systems that embed programmable components in
order to control a physical process or infrastructure. CPS are henceforth widely used in …

Совершенствование графов атак для мониторинга кибербезопасности: оперирование неточностями, обработка циклов, отображение инцидентов и …

ЕВ Дойникова, ИВ Котенко - Информатика и автоматизация, 2018 - mathnet.ru
Своевременность и адекватность реагирования на инциденты компьютерной
безопасности, а также потери организаций от компьютерных атак, зависят от точности …

Evaluating practitioner cyber-security attack graph configuration preferences

HS Lallie, K Debattista, J Bal - Computers & Security, 2018 - Elsevier
Attack graphs and attack trees are a popular method of mathematically and visually
representing the sequence of events that lead to a successful cyber-attack. Despite their …

Effective network vulnerability assessment through model abstraction

S Zhang, X Ou, J Homer - Detection of Intrusions and Malware, and …, 2011 - Springer
A significant challenge in evaluating network security stems from the scale of modern
enterprise networks and the vast number of vulnerabilities regularly found in software …