G Falco, A Viswanathan, C Caldera, H Shrobe - IEEE Access, 2018 - ieeexplore.ieee.org
America's critical infrastructure is becoming “smarter” and increasingly dependent on highly specialized computers called industrial control systems (ICS). Networked ICS components …
Cyber security is among the most complex and rapidly evolving issues and has been the focus of present day organizations. Cyber security risk management is the process of …
S Khan, S Madnick - IEEE Transactions on Dependable and …, 2021 - ieeexplore.ieee.org
Recent cyber-physical attacks, such as Stuxnet, Triton etc., have invoked an ominous realization about the vulnerability of critical infrastructure, including water, power and gas …
In this chapter, we review the pervasiveness of cyber threats and the roles of both attackers and cyber users (ie the targets of the attackers); the lack of awareness of cyber-threats by …
Urban mobility is in the midst of a revolution, driven by the convergence of technologies such as artificial intelligence, on-demand ride services, and Internet-connected and self …
Recent hacks into blockchain systems and heists from such systems have raised serious questions about whether this new technology can be secured from ongoing, evolving …
" The supreme art of war is to subdue the enemy without fighting."-Sun Tsu from" The Art of War" Believed to have lived between 770 and 476 BC In the age of code wars, have our …
The internet has become an intrinsic part of human life in the modern era. Ranging from online shopping to transportation, banking, social connectivity, etc. almost every element of …
D Yan - arXiv preprint arXiv:2001.05734, 2020 - arxiv.org
Solving cybersecurity issues requires a holistic understanding of components, factors, structures and their interactions in cyberspace, but conventional modeling approaches view …