An Empirical Study of Web Software Trustworthiness Measurement
Xie, X. L., Xue, W. X.. 2018. An Empirical Study of Web Software Trustworthiness Measurement. 2018 2nd IEEE Advanced Information Management,Communicates,Electronic and Automation Control Conference...
View ArticleCoverage-Based Heuristics for Selecting Assessment Items from Security...
Rosa, F. De Franco, Jino, M., Bueno, P. Marcos Siqueira, Bonacin, R.. 2018. Coverage-Based Heuristics for Selecting Assessment Items from Security Standards: A Core Set Proposal. 2018 Workshop on...
View ArticleCybersecurity assurance control baselining for smart grid communication systems
Ogundokun, A., Zavarsky, P., Swar, B.. 2018. Cybersecurity assurance control baselining for smart grid communication systems. 2018 14th IEEE International Workshop on Factory Communication Systems...
View ArticleEvaluation of Two RFID Traffic Models with Potential in Anomaly Detection
Alkadi, A., Chi, H., Prodanoff, Z. G., Kreidl, P.. 2018. Evaluation of Two RFID Traffic Models with Potential in Anomaly Detection. SoutheastCon 2018. :1–5.
View ArticleStealthy Injection Attacks Against IEC61850's GOOSE Messaging Service
Wright, James G., Wolthusen, Stephen D.. 2018. Stealthy Injection Attacks Against IEC61850's GOOSE Messaging Service. 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe)....
View ArticleDeveloping Battery of Vulnerability Tests for Industrial Control Systems
Fujdiak, Radek, Blazek, Petr, Mlynek, Petr, Misurec, Jiri. 2019. Developing Battery of Vulnerability Tests for Industrial Control Systems. 2019 10th IFIP International Conference on New Technologies,...
View ArticleInformation Inconsistencies in Smart Distribution Grids under Different...
Muka, Romina, Haugli, Fredrik Bakkevig, Vefsnmo, Hanne, Heegaard, Poul E.. 2019. Information Inconsistencies in Smart Distribution Grids under Different Failure Causes modelled by Stochastic Activity...
View ArticleRisk and avoidance strategy for blocking mechanism of SDN-based security service
Byun, Minjae, Lee, Yongjun, Choi, Jin-Young. 2019. Risk and avoidance strategy for blocking mechanism of SDN-based security service. 2019 21st International Conference on Advanced Communication...
View ArticleThe Actual Problems of IT-Security Process Assurance
Livshitz, Ilva I., Lontsikh, Pawel A., Lontsiklr, Natalia P., Karascv, Sergey, Golovina, Elena. 2019. The Actual Problems of IT-Security Process Assurance. 2019 International Conference "Quality...
View ArticleAutomated IT Audit of Windows Server Access Control
PONGSRISOMCHAI, Sutthinee, Ngamsuriyaroj, Sudsanguan. 2019. Automated IT Audit of Windows Server Access Control. 2019 21st International Conference on Advanced Communication Technology (ICACT)....
View ArticleAttacking IEC-60870-5-104 SCADA Systems
Radoglou-Grammatikis, Panagiotis, Sarigiannidis, Panagiotis, Giannoulakis, Ioannis, Kafetzakis, Emmanouil, Panaousis, Emmanouil. 2019. Attacking IEC-60870-5-104 SCADA Systems. 2019 IEEE World...
View ArticleERAMIS: A Reference Architecture-Based Methodology for IoT Systems
Kearney, Paul, Asal, Rasool. 2019. ERAMIS: A Reference Architecture-Based Methodology for IoT Systems. 2019 IEEE World Congress on Services (SERVICES). 2642-939X:366—367.
View ArticleSecuring GOOSE: The Return of One-Time Pads
Boakye-Boateng, Kwasi, Lashkari, Arash Habibi. 2019. Securing GOOSE: The Return of One-Time Pads. 2019 International Carnahan Conference on Security Technology (ICCST). :1—8.
View ArticleResearch on a General Fast Analysis Algorithm Model for Pd Acoustic Detection...
Si, Wen-Rong, Fu, Chen-Zhao, Gao, Kai, Zhang, Jia-Min, He, Lin, Bao, Hai-Long, Wu, Xin-Ye. 2019. Research on a General Fast Analysis Algorithm Model for Pd Acoustic Detection System: The Algorithm...
View ArticlePrivacy and Security of Big Data in AI Systems: A Research and Standards...
Dilmaghani, Saharnaz, Brust, Matthias R., Danoy, Grégoire, Cassagnes, Natalia, Pecero, Johnatan, Bouvry, Pascal. 2019. Privacy and Security of Big Data in AI Systems: A Research and Standards...
View ArticleA Security Reference Architecture for Blockchains
Homoliak, Ivan, Venugopalan, Sarad, Hum, Qingze, Szalachowski, Pawel. 2019. A Security Reference Architecture for Blockchains. 2019 IEEE International Conference on Blockchain (Blockchain). :390–397.
View ArticleEfficient Modeling of HIL Multi-Grid System for Scalability Concurrency in...
Ravikumar, Gelli, Hyder, Burhan, Govindarasu, Manimaran. 2019. Efficient Modeling of HIL Multi-Grid System for Scalability Concurrency in CPS Security Testbed. 2019 North American Power Symposium...
View ArticleA Collaborative Defense for Securing Protective Relay Settings in Electrical...
Nuqui, Reynaldo, Hong, Junho, Kondabathini, Anil, Ishchenko, Dmitry, Coats, David. 2018. A Collaborative Defense for Securing Protective Relay Settings in Electrical Cyber Physical Systems. 2018...
View ArticleSecurity Development Lifecycle for Cyber-Physical Production Systems
Eckhart, Matthias, Ekelhart, Andreas, Lüder, Arndt, Biffl, Stefan, Weippl, Edgar. 2019. Security Development Lifecycle for Cyber-Physical Production Systems. IECON 2019 - 45th Annual Conference of...
View ArticleA Top Down Approach for Eliciting Systems Security Requirements for a...
Mailloux, L. O., Span, M., Mills, R. F., Young, W.. 2019. A Top Down Approach for Eliciting Systems Security Requirements for a Notional Autonomous Space System. 2019 IEEE International Systems...
View ArticleA Symbolic Analysis of ECC-Based Direct Anonymous Attestation
Whitefield, J., Chen, L., Sasse, R., Schneider, S., Treharne, H., Wesemeyer, S.. 2019. A Symbolic Analysis of ECC-Based Direct Anonymous Attestation. 2019 IEEE European Symposium on Security and...
View ArticleAdversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols
Nweke, L. O., Weldehawaryat, G. Kahsay, Wolthusen, S. D.. 2020. Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols. 2020 16th International Conference on the Design of...
View ArticleCyber-security considerations for domestic-level automated demand-response...
Hastings, John C., Laverty, David M., Jahic, Admir, Morrow, D John, Brogan, Paul. 2020. Cyber-security considerations for domestic-level automated demand-response systems utilizing public-key...
View ArticleCyber Attacks on Power System Automation and Protection and Impact Analysis
Rajkumar, Vetrivel Subramaniam, Tealane, Marko, \c Stefanov, Alexandru, Presekal, Alfan, Palensky, Peter. 2020. Cyber Attacks on Power System Automation and Protection and Impact Analysis. 2020 IEEE...
View ArticleCommunication and Information Security Assessment of a Digital Substation
Claveria, Joevis J., Kalam, Akhtar. 2020. Communication and Information Security Assessment of a Digital Substation. 2020 Australasian Universities Power Engineering Conference (AUPEC). :1–7.
View ArticleTowards a Threat Modeling Approach Addressing Security and Safety in OT...
Hollerer, Siegfried, Kastner, Wolfgang, Sauter, Thilo. 2021. Towards a Threat Modeling Approach Addressing Security and Safety in OT Environments. 2021 17th IEEE International Conference on Factory...
View ArticleInformation Security Culture Model. A Case Study
Marchand-Niño, William-Rogelio, Samaniego, Hector Huamán. 2021. Information Security Culture Model. A Case Study. 2021 XLVII Latin American Computing Conference (CLEI). :1–10.
View ArticleCybersecurity Certification for Agile and Dynamic Software Systems – a...
Lotz, Volkmar. 2020. Cybersecurity Certification for Agile and Dynamic Software Systems – a Process-Based Approach. 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). :85–88.
View ArticleAnomaly Detection of ICS Communication Using Statistical Models
Burgetová, Ivana, Matoušek, Petr, Ryšavý, Ondřej. 2021. Anomaly Detection of ICS Communication Using Statistical Models. 2021 17th International Conference on Network and Service Management (CNSM)....
View ArticleComparative Analysis of Specialized Standards and Methods on Increasing the...
Stefanova-Stoyanova, Varbinka, Danov, Petko. 2022. Comparative Analysis of Specialized Standards and Methods on Increasing the Effectiveness and Role of PDCA for Risk Control in Management Systems....
View Article
More Pages to Explore .....