Abstract
The digital revolution has made people more dependent on ICT technology to perform everyday tasks, whether at home or at work [...]
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference23 articles.
1. Proposal for Legislation to Improve the UK’s Cyber Resilience;DCMS,2022
2. Threat Landscape for Supply Chain Attacks
https://www.enisa.europa.eu/publications/threat-landscape-for-supplychain-attacks
3. A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom
4. Ocsvm model combined with k-means recursive clustering for intrusion detection in scada systems;Maglaras;Proceedings of the 10th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness,2014
5. Measuring the risk of cyber attack in industrial control systems;Cook;Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016 (ICS-CSR),2016
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Application of Structural Equation Modelling to Cybersecurity Risk Analysis in the Era of Industry 4.0;Mathematics;2024-01-20
2. Reliability Analysis of Fault Tolerant Memory Systems;2023 8th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM);2023-11-10
3. Zero-Day Threats Detection for Critical Infrastructures;South African Institute of Computer Scientists and Information Technologists;2023