Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             16 results found
no title author magazine year volume issue page(s) type
1 An AutoML-based security defender for industrial control systems Vasan, Danish

47 C p.
article
2 A tri-level optimization model for interdependent infrastructure network resilience against compound hazard events Oster, Matthew R.

47 C p.
article
3 Comprehensive vulnerability assessment for environmental facility depending on spatial characteristics in South Korea Choi, Young Hwan

47 C p.
article
4 Digital Twin-assisted anomaly detection for industrial scenarios Alcaraz, Cristina

47 C p.
article
5 Editorial Board
47 C p.
article
6 Evaluation of SDN security measures in the context of IEC 62443-3-3 Makrakis, Georgios Michail

47 C p.
article
7 FingerCI: Writing industrial process specifications from network traffic Apolinário, Filipe

47 C p.
article
8 Impact of Internet and mobile communication on cyber resilience: A multivariate adaptive regression spline modeling approach Lyeonov, Serhiy

47 C p.
article
9 Obfuscation strategies for industrial control systems Cozza, Vittoria

47 C p.
article
10 Optimized unmanned aerial vehicle pathway system in disaster resilience network Ma, Yi-Wei

47 C p.
article
11 Physical threats vs Cyber threats Setola, Roberto

47 C p.
article
12 Process-aware security monitoring in industrial control systems: A systematic review and future directions Rehman, Muaan ur

47 C p.
article
13 Resilience quantification and recovery strategy simulation for urban underground logistics systems under node and link attacks: A case study of Nanjing city Lu, Ying

47 C p.
article
14 Securing industrial control systems: Developing a SCADA/IoT test bench and evaluating lightweight cipher performance on hardware simulator Upadhyay, Darshana

47 C p.
article
15 SIRT: A distinctive and smart invasion recognition tool (SIRT) for defending IoT integrated ICS from cyber-attacks Kavitha, M.S.

47 C p.
article
16 Space cybersecurity challenges, mitigation techniques, anticipated readiness, and future directions Khan, Shah Khalid

47 C p.
article
                             16 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands