4.7 Article

Cybersecurity Standards in the Context of Operating System: Practical Aspects, Analysis, and Comparisons

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

DependData: Data collection dependability through three -layer decision -making in BSNs for healthcare monitoring

Tao Hai et al.

INFORMATION FUSION (2020)

Article Business

Cyber Risk Analysis for a Smart Grid: How Smart is Smart Enough? A Multiarmed Bandit Approach to Cyber Security Investment

Matthew David Smith et al.

IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT (2018)

Article Computer Science, Information Systems

A Survey on Smart Grid Cyber-Physical System Testbeds

Mehmet Hazar Cintuglu et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Article Computer Science, Artificial Intelligence

Cyber Security and the Role of Intelligent Systems in Addressing its Challenges

Yaniv Harel et al.

ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2017)

Proceedings Paper Computer Science, Interdisciplinary Applications

Designing model for calculating the amount of cyber risk insurance

Krerk Piromsopa et al.

2017 FOURTH INTERNATIONAL CONFERENCE ON MATHEMATICS AND COMPUTERS IN SCIENCES AND IN INDUSTRY (MCSI) (2017)

Proceedings Paper Computer Science, Theory & Methods

Understanding Taxonomy of Cyber Risks for Cybersecurity Insurance of Financial Industry in Cloud Computing

Sam Adam Elnagdy et al.

2016 IEEE 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD) (2016)

Article Computer Science, Hardware & Architecture

Effects of virtualization on information security

Shing-Han Li et al.

COMPUTER STANDARDS & INTERFACES (2015)

Article Computer Science, Hardware & Architecture

An ontology for the harmonization of multiple standards and models

Cesar Pardo et al.

COMPUTER STANDARDS & INTERFACES (2012)

Article Computer Science, Hardware & Architecture

SCF - A framework supporting achieving and assessing conformity with standards

Lukasz Cyra et al.

COMPUTER STANDARDS & INTERFACES (2011)

Editorial Material Computer Science, Information Systems

Stuxnet: Dissecting a Cyberwarfare Weapon

Ralph Langner

IEEE SECURITY & PRIVACY (2011)

Article Computer Science, Information Systems

A Novel Key Management Solution for Reinforcing Compliance With HIPAA Privacy/Security Regulations

Chien-Ding Lee et al.

IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE (2011)

Article Geosciences, Multidisciplinary

Common Criteria for the Assessment of Critical Infrastructures

Alexander Fekete

INTERNATIONAL JOURNAL OF DISASTER RISK SCIENCE (2011)

Article Computer Science, Hardware & Architecture

A common criteria based security requirements engineering process for the development of secure information systems

Daniel Mellado et al.

COMPUTER STANDARDS & INTERFACES (2007)