Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "Journal of Digital Imaging"
DOI: 10.1007/s10278-021-00562-y
Abstract: Medical imaging devices (MIDs) are exposed to cyber-security threats. Currently, a comprehensive, efficient methodology dedicated to MID cyber-security risk assessment is lacking. We propose the Threat identification, ontology-based Likelihood, severity Decomposition, and Risk assessment (TLDR)…
read more here.
Keywords:
risk;
methodology;
risk assessment;
cyber security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "Wireless Personal Communications"
DOI: 10.1007/s11277-021-08801-9
Abstract: Cyber security offers digital data sets that allow learning analysis, for example, to use tracks to enhance the learning process and environment that learners leave behind. Focus on using learning analytics in data security training…
read more here.
Keywords:
user centric;
machine learning;
system;
cyber security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "Arabian Journal for Science and Engineering"
DOI: 10.1007/s13369-019-04319-2
Abstract: There has been a tremendous increase in research in the area of cyber security to support cyber applications and to avoid key security threats faced by these applications. The goal of this study is to…
read more here.
Keywords:
study;
security threats;
cyber security;
security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Energy Reports"
DOI: 10.1016/j.egyr.2021.08.126
Abstract: Abstract At present, most of the economic, commercial, cultural, social and governmental activities and interactions of countries, at all levels, including individuals, non-governmental organizations and government and governmental institutions, are carried out in cyberspace. Recently,…
read more here.
Keywords:
cyber attacks;
study;
cyber security;
security ... See more keywords
Photo from academic.microsoft.com
Sign Up to like & get
recommendations!
0
Published in 2018 at "ICT Express"
DOI: 10.1016/j.icte.2018.02.001
Abstract: Abstract Modern Supervisory Control and Data Acquisition (SCADA) systems are essential for monitoring and managing electric power generation, transmission and distribution. In the age of the Internet of Things, SCADA has evolved into big, complex…
read more here.
Keywords:
critical infrastructures;
security critical;
cyber security;
security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "IFAC-PapersOnLine"
DOI: 10.1016/j.ifacol.2020.12.803
Abstract: Abstract Modern Energy Power Systems (EPS) are characterized by a rather high share of distributed generation, renewable energy sources (RES) and energy storage systems (ESS) operating under the control of smart devices. For transition to…
read more here.
Keywords:
energy storages;
power;
networks energy;
energy ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2017 at "Nuclear Engineering and Technology"
DOI: 10.1016/j.net.2016.11.004
Abstract: Abstract Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory…
read more here.
Keywords:
security risk;
risk evaluation;
cyber security;
security ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "Journal of Communication"
DOI: 10.1080/0976691x.2017.1317502
Abstract: The innovation of the information and communication technology which has produced the Internet to connect the whole world as a global village has been seen as a vital aspect of our daily lives. Many organizations…
read more here.
Keywords:
insurance companies;
cyber security;
security;
analysis cyber ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2022 at "Health Physics"
DOI: 10.1097/hp.0000000000001607
Abstract: Abstract The onset of the COVID pandemic impacted various regulatory agencies’ ability to safely fulfill their regulatory compliance inspection mandates via on-site inspections. Some agencies shifted to a remote or hybrid inspection process, which necessitates…
read more here.
Keywords:
compliance;
remote hybrid;
radiation;
cyber security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2879996
Abstract: The now ubiquitous use of information technology poses a crucial challenge to the cyber security of power grid operations, one that has aroused serious concerns from both industry and academia. The state-of-the-art research either focuses…
read more here.
Keywords:
component;
cyber security;
power;
vulnerability ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.2983280
Abstract: Social engineering is one of the biggest threats organizations face today, as more and more organizations are adopting digitalization. In the context of cyber security, social engineering is the practice of taking advantage of human…
read more here.
Keywords:
analysis findings;
engineering;
social engineering;
findings social ... See more keywords