nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An AutoML-based security defender for industrial control systems
|
Vasan, Danish |
|
|
47 |
C |
p. |
artikel |
2 |
A tri-level optimization model for interdependent infrastructure network resilience against compound hazard events
|
Oster, Matthew R. |
|
|
47 |
C |
p. |
artikel |
3 |
Comprehensive vulnerability assessment for environmental facility depending on spatial characteristics in South Korea
|
Choi, Young Hwan |
|
|
47 |
C |
p. |
artikel |
4 |
Digital Twin-assisted anomaly detection for industrial scenarios
|
Alcaraz, Cristina |
|
|
47 |
C |
p. |
artikel |
5 |
Editorial Board
|
|
|
|
47 |
C |
p. |
artikel |
6 |
Evaluation of SDN security measures in the context of IEC 62443-3-3
|
Makrakis, Georgios Michail |
|
|
47 |
C |
p. |
artikel |
7 |
FingerCI: Writing industrial process specifications from network traffic
|
Apolinário, Filipe |
|
|
47 |
C |
p. |
artikel |
8 |
Impact of Internet and mobile communication on cyber resilience: A multivariate adaptive regression spline modeling approach
|
Lyeonov, Serhiy |
|
|
47 |
C |
p. |
artikel |
9 |
Obfuscation strategies for industrial control systems
|
Cozza, Vittoria |
|
|
47 |
C |
p. |
artikel |
10 |
Optimized unmanned aerial vehicle pathway system in disaster resilience network
|
Ma, Yi-Wei |
|
|
47 |
C |
p. |
artikel |
11 |
Physical threats vs Cyber threats
|
Setola, Roberto |
|
|
47 |
C |
p. |
artikel |
12 |
Process-aware security monitoring in industrial control systems: A systematic review and future directions
|
Rehman, Muaan ur |
|
|
47 |
C |
p. |
artikel |
13 |
Resilience quantification and recovery strategy simulation for urban underground logistics systems under node and link attacks: A case study of Nanjing city
|
Lu, Ying |
|
|
47 |
C |
p. |
artikel |
14 |
Securing industrial control systems: Developing a SCADA/IoT test bench and evaluating lightweight cipher performance on hardware simulator
|
Upadhyay, Darshana |
|
|
47 |
C |
p. |
artikel |
15 |
SIRT: A distinctive and smart invasion recognition tool (SIRT) for defending IoT integrated ICS from cyber-attacks
|
Kavitha, M.S. |
|
|
47 |
C |
p. |
artikel |
16 |
Space cybersecurity challenges, mitigation techniques, anticipated readiness, and future directions
|
Khan, Shah Khalid |
|
|
47 |
C |
p. |
artikel |