This paper reviews the state of the art in cyber security risk assessment of Supervisory Control and Data Acquisition (SCADA) systems. We select and in-detail examine twenty-four …
M Seiver, S Cohen - US Patent 9,648,036, 2017 - Google Patents
Methods, systems, and apparatus, including computer pro grams encoded on computer storage media, for network risk assessment. One of the methods includes obtaining infor …
Cybersecurity and resiliency of wide-area monitoring, protection, and control (WAMPAC) applications is critically important to ensure secure, reliable, and economical operation of …
Security metrics have received significant attention. However, they have not been systematically explored based on the understanding of attack-defense interactions, which …
S Sharma, A Kaul - Vehicular communications, 2018 - Elsevier
Vehicular ad-hoc Network (VANET) is an emerging type of Mobile ad-hoc Networks (MANETs) with excellent applications in the intelligent traffic system. Applications in VANETs …
Decision-making in the context of organizational information security is highly dependent on various information. For information security managers, not only relevant information has to …
DW Woods, R Böhme - 2021 IEEE Symposium on Security and …, 2021 - ieeexplore.ieee.org
This paper introduces a causal model inspired by structural equation modeling that explains cyber risk outcomes in terms of latent factors measured using reflexive indicators. First, we …
Cloud computing is expected to become a common solution for deploying applications thanks to its capacity to leverage developers from infrastructure management tasks, thus …
Drastic reduction in the manufacturing cost of sensors and actuators has resulted in considerable growth in the number of smart objects. The so-called Internet of Things (IoT) …