Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems (original) (raw)

Modelling and Deploying Security Policies

Ruben Parra Alonso

Proceedings of the Fifth International Conference on Web Information Systems and Technologies, 2009

View PDFchevron_right

From Security Protocols to Systems Security

Brian Monahan

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Enabling automated threat response through the use of a dynamic security policy

Hervé Debar

Journal in Computer Virology, 2007

View PDFchevron_right

Industrial Cyber-Physical Systems: Risks Assessment and Attacks Modeling

Kirill Dmitrenko

Cyber-Physical Systems: Industry 4.0 Challenges, 2019

View PDFchevron_right

How to Specify Security Services: A Practical Approach

José L. Vivas

Lecture Notes in Computer Science, 2003

View PDFchevron_right

Cyber Security Management

Dhirodatta Subba

Salesian journal of humanities and social sciences, 2014

View PDFchevron_right

Cyber physical systems security: Analysis, challenges and solutions

Yosef Ashibani

Computers & Security, 2017

View PDFchevron_right

Cybersecurity Infrastructure and Security Automation

ALEX R MATHEW

Advanced Computing: An International Journal

View PDFchevron_right

Conceptualizing the key features of cyber-physical systems in a multi-layered representation for safety and security analysis

Igor Kozin

Systems Engineering

View PDFchevron_right

Approaches to human security

SUNITA TARAI

View PDFchevron_right

A concept for strategic cyber defense

Don Faatz

2003

View PDFchevron_right

Cyber Physical Systems Security for Maritime Assets

Nikitas Nikitakos

2021

View PDFchevron_right

A Generic Framework for Information Security Policy Development

Setyawan Widyarto

Proceeding of the Electrical Engineering Computer Science and Informatics, 2017

View PDFchevron_right

Planning organizational security

Susan Lincke

Proceedings of the 13th annual conference on Information technology education - SIGITE '12, 2012

View PDFchevron_right

Cyber security: challenges for society-literature review

Kent Zamora

View PDFchevron_right

Practitioners’ Views on Cybersecurity Control Adoption and Effectiveness

Michael Goldsmith

Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021

View PDFchevron_right

Cyber Security

marvin odhiambo

View PDFchevron_right

Network Security: Vulnerabilities and Disclosure Policy*

Chaim Fershtman

The Journal of Industrial Economics, 2010

View PDFchevron_right

Security Projects for Systems and Networking Professionals

Hamid Arabnia

Emerging Trends in ICT Security, 2014

View PDFchevron_right

Guide to developing a National Cyber Security Strategy

Mohammed I Alghamdi

Materials Today: Proceedings, 2021

View PDFchevron_right

The Policy Machine for Security Policy Management

David Ferraiolo

Lecture Notes in Computer Science, 2001

View PDFchevron_right

Socio-Technical Perspective in Determining the Factors and Components for Minimizing Cybersecurity Threat

eko haryadi

TEM Journal, 2023

View PDFchevron_right

XANDAR: A holistic Cybersecurity Engineering Process for Safety-critical and Cyber-physical Systems

Sakir Sezer

2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring)

View PDFchevron_right

A Model-Based Framework for Security Policy Specification, Deployment and Testing

Y. Le Traon

Model Driven Engineering Languages and Systems, 2008

View PDFchevron_right

Model-based risk assessment for cyber physical systems security

Ashraf Tantawy

Computers & Security, 2020

View PDFchevron_right

Information Security Policies

Jatinder N.d Gupta

Handbook of Research on Information Security and Assurance

View PDFchevron_right

Impact Assessment of IT Security Breaches in Cyber-Physical Systems: Short paper

András Pataricza

2021 10th Latin-American Symposium on Dependable Computing (LADC), 2021

View PDFchevron_right

Security Culture: Present and Future Strategies, Policies and Characteristics

Marina Mitrevska

2023

View PDFchevron_right

The human infrastructure of cyberinfrastructure

Gloria Mark

Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work - CSCW '06, 2006

View PDFchevron_right

Mechanisms of cyber security: the problem of conceptualization

Piotr Milczarski

Безпека інформаціі, 2019

View PDFchevron_right

Security Risks in Mechanical Engineering Industries

Shawon Rahman

International Journal of Computer Science …, 2011

View PDFchevron_right

On the Application of the Safety-II Concept in a Security Context

Riana Steen

European Journal for Security Research

View PDFchevron_right

Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance

Serkan Savaş

International Cybersecurity Law Review, 2022

View PDFchevron_right

Quantitative assessment of operational security: Models and tools

Mohamed Kaaniche

1996

View PDFchevron_right

Towards a Systemic Approach for Information Security Risk Management

Christophe Feltus

2016 11th International Conference on Availability, Reliability and Security (ARES), 2016

View PDFchevron_right