Articles with "cyber security" as a keyword



Photo from wikipedia

A Cyber-Security Risk Assessment Methodology for Medical Imaging Devices: the Radiologists’ Perspective

Sign Up to like & get
recommendations!
Published in 2022 at "Journal of Digital Imaging"

DOI: 10.1007/s10278-021-00562-y

Abstract: Medical imaging devices (MIDs) are exposed to cyber-security threats. Currently, a comprehensive, efficient methodology dedicated to MID cyber-security risk assessment is lacking. We propose the Threat identification, ontology-based Likelihood, severity Decomposition, and Risk assessment (TLDR)… read more here.

Keywords: risk; methodology; risk assessment; cyber security ... See more keywords
Photo from wikipedia

A User-Centric Machine Learning for Learning Support System with Adequate Cyber Security

Sign Up to like & get
recommendations!
Published in 2021 at "Wireless Personal Communications"

DOI: 10.1007/s11277-021-08801-9

Abstract: Cyber security offers digital data sets that allow learning analysis, for example, to use tracks to enhance the learning process and environment that learners leave behind. Focus on using learning analytics in data security training… read more here.

Keywords: user centric; machine learning; system; cyber security ... See more keywords
Photo from wikipedia

Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study

Sign Up to like & get
recommendations!
Published in 2020 at "Arabian Journal for Science and Engineering"

DOI: 10.1007/s13369-019-04319-2

Abstract: There has been a tremendous increase in research in the area of cyber security to support cyber applications and to avoid key security threats faced by these applications. The goal of this study is to… read more here.

Keywords: study; security threats; cyber security; security ... See more keywords
Photo from wikipedia

A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments

Sign Up to like & get
recommendations!
Published in 2021 at "Energy Reports"

DOI: 10.1016/j.egyr.2021.08.126

Abstract: Abstract At present, most of the economic, commercial, cultural, social and governmental activities and interactions of countries, at all levels, including individuals, non-governmental organizations and government and governmental institutions, are carried out in cyberspace. Recently,… read more here.

Keywords: cyber attacks; study; cyber security; security ... See more keywords
Photo from academic.microsoft.com

Cyber security of critical infrastructures

Sign Up to like & get
recommendations!
Published in 2018 at "ICT Express"

DOI: 10.1016/j.icte.2018.02.001

Abstract: Abstract Modern Supervisory Control and Data Acquisition (SCADA) systems are essential for monitoring and managing electric power generation, transmission and distribution. In the age of the Internet of Things, SCADA has evolved into big, complex… read more here.

Keywords: critical infrastructures; security critical; cyber security; security ... See more keywords
Photo from wikipedia

Cyber security of electric networks with energy storages

Sign Up to like & get
recommendations!
Published in 2020 at "IFAC-PapersOnLine"

DOI: 10.1016/j.ifacol.2020.12.803

Abstract: Abstract Modern Energy Power Systems (EPS) are characterized by a rather high share of distributed generation, renewable energy sources (RES) and energy storage systems (ESS) operating under the control of smart devices. For transition to… read more here.

Keywords: energy storages; power; networks energy; energy ... See more keywords
Photo by scottwebb from unsplash

Cyber Security Risk Evaluation of a Nuclear I&C Using BN and ET

Sign Up to like & get
recommendations!
Published in 2017 at "Nuclear Engineering and Technology"

DOI: 10.1016/j.net.2016.11.004

Abstract: Abstract Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory… read more here.

Keywords: security risk; risk evaluation; cyber security; security ... See more keywords
Photo by scottwebb from unsplash

Analysis of Cyber-security Benefits on Cyberspace in Nigerian Insurance Companies

Sign Up to like & get
recommendations!
Published in 2017 at "Journal of Communication"

DOI: 10.1080/0976691x.2017.1317502

Abstract: The innovation of the information and communication technology which has produced the Internet to connect the whole world as a global village has been seen as a vital aspect of our daily lives. Many organizations… read more here.

Keywords: insurance companies; cyber security; security; analysis cyber ... See more keywords
Photo by kiranck123 from unsplash

Basic Cyber Security Considerations for Licensees of Radioactive Materials and Registrants of Radiation Producing Devices in an Era of Remote or Hybrid Compliance Inspections

Sign Up to like & get
recommendations!
Published in 2022 at "Health Physics"

DOI: 10.1097/hp.0000000000001607

Abstract: Abstract The onset of the COVID pandemic impacted various regulatory agencies’ ability to safely fulfill their regulatory compliance inspection mandates via on-site inspections. Some agencies shifted to a remote or hybrid inspection process, which necessitates… read more here.

Keywords: compliance; remote hybrid; radiation; cyber security ... See more keywords
Photo from wikipedia

A Survey on Power Grid Cyber Security: From Component-Wise Vulnerability Assessment to System-Wide Impact Analysis

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2879996

Abstract: The now ubiquitous use of information technology poses a crucial challenge to the cyber security of power grid operations, one that has aroused serious concerns from both industry and academia. The state-of-the-art research either focuses… read more here.

Keywords: component; cyber security; power; vulnerability ... See more keywords
Photo by priscilladupreez from unsplash

Analysis and Findings of Social Engineering Industry Experts Explorative Interviews: Perspectives on Measures, Tools, and Solutions

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2983280

Abstract: Social engineering is one of the biggest threats organizations face today, as more and more organizations are adopting digitalization. In the context of cyber security, social engineering is the practice of taking advantage of human… read more here.

Keywords: analysis findings; engineering; social engineering; findings social ... See more keywords