From post

A Holistic Approach for Cyber Assurance of Critical Infrastructure with the Viable System Model.

, , , и . SEC, том 428 из IFIP Advances in Information and Communication Technology, стр. 438-445. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Container Escape Detection for Edge Devices., , , , , , , , , и 4 other автор(ы). SenSys, стр. 532-536. ACM, (2021)Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System., , , , , и . HCI (22), том 9190 из Lecture Notes in Computer Science, стр. 379-390. Springer, (2015)Challenges in the Design and Implementation of IoT Testbeds in Smart-Cities: A Systematic Review., , , , , , , и . CoRR, (2023)Federated Deep Learning for Intrusion Detection in IoT Networks., , , , , и . GLOBECOM, стр. 237-242. IEEE, (2023)Applying the ACPO Guidelines to Building Automation Systems., , , , , и . HCI (22), том 9190 из Lecture Notes in Computer Science, стр. 684-692. Springer, (2015)An Intrusion Detection System Based on Deep Belief Networks., , , и . SciSec, том 13580 из Lecture Notes in Computer Science, стр. 377-392. Springer, (2022)A Holistic Approach for Cyber Assurance of Critical Infrastructure with the Viable System Model., , , и . SEC, том 428 из IFIP Advances in Information and Communication Technology, стр. 438-445. Springer, (2014)Managing cyber security risks in industrial control systems with game theory and viable system modelling., , , , и . SoSE, стр. 266-271. IEEE, (2014)Soft systems methodology in net-centric cyber defence system development., , , и . SMC, стр. 672-677. IEEE, (2014)A Comparative Study of Android Users' Privacy Preferences Under the Runtime Permission Model., , , и . HCI (22), том 10292 из Lecture Notes in Computer Science, стр. 604-622. Springer, (2017)