Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2023.3321176
Abstract: For researchers studying cyber-physical system security, working with realistic datasets is essential. To produce the datasets, the existing methodology is to emulate the cyber network. A challenge is that the industrial control systems (ICS) network…
read more here.
Keywords:
based cybersecurity;
cybersecurity model;
physical testbed;
emulation ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2023 at "Applied Sciences"
DOI: 10.3390/app13106145
Abstract: Cybersecurity attacks are still causing significant threats to individuals and organizations, affecting almost all aspects of life. Therefore, many countries worldwide try to overcome this by introducing and applying cybersecurity regularity frameworks to maintain organizations’…
read more here.
Keywords:
compliance;
compliance assessment;
cybersecurity;
based cybersecurity ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "Future Internet"
DOI: 10.3390/fi16030069
Abstract: Ontologies have the potential to play an important role in the cybersecurity landscape as they are able to provide a structured and standardized way to semantically represent and organize knowledge about a domain of interest.…
read more here.
Keywords:
ontology;
based cybersecurity;
ontology based;
cybersecurity framework ... See more keywords