Network forensics is based on the analysis of network traffic. Traffic analysis is a routine procedure, but it allows one to not only identify the cause of the security breach, but also …
The visualization of network traffic flows is an open problem that affects the control and administration of communication networks. Feature vectors used for representing traffic …
W Depamelaere, L Lemaire, J Vossaert… - … Symposium for ICS & …, 2018 - scienceopen.com
Over the last decades, cyber-physical systems have evolved from isolated to complex interconnected systems that are remotely accessible. This made them easier to attack …
Currently, the methods and means of human–machine interaction and visualization as its integral part are being increasingly developed. In various fields of scientific knowledge and …
The paper proposes an approach for visualization of access control systems based on triangular matrices. The approach is used for visualization of access control security model …
The concept of a Smart City is the forefront in the development of our near future. One of the most important parts of such cities is the transport infrastructure. Threats implementation for …