Articles with "security vulnerability" as a keyword



A security vulnerability analysis model for dangerous goods transportation by rail – Case study: Chlorine transportation in Texas-Illinois

Sign Up to like & get
recommendations!
Published in 2018 at "Safety Science"

DOI: 10.1016/j.ssci.2018.04.026

Abstract: Abstract Transportation of dangerous goods has always been in the spotlight of terrorist groups with the aim of inflicting severe harm to humans and the environment. The purpose of this paper is to present a… read more here.

Keywords: transportation; security vulnerability; vulnerability analysis; dangerous goods ... See more keywords

Security and Vulnerability of Extreme Automation Systems: The IoMT and IoA Case Studies

Sign Up to like & get
recommendations!
Published in 2019 at "IT Professional"

DOI: 10.1109/mitp.2019.2906442

Abstract: The Internet of Medical Things (IoMT) and the Internet of Aviation (IoA) are emerging waves of technologies that contributes to establishing-connected systems. It consists of smart devices, such as wearables, sensors technology, smart algorithms, and… read more here.

Keywords: vulnerability extreme; iomt ioa; security vulnerability; extreme automation ... See more keywords