Academic literature on the topic 'Cyber-infrastructure'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber-infrastructure.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cyber-infrastructure"
MANUILOV, Y. "Cyber security of critical infrastructure during cyber warfare." INFORMATION AND LAW, no. 1(44) (March 28, 2023): 154–67. http://dx.doi.org/10.37750/2616-6798.2023.1(44).287780.
Full textSatya Praveen Kumar, Naga. "Cybersecurity and Cyber Attacks in Cloud Infrastructure." International Journal of Science and Research (IJSR) 12, no. 4 (2023): 1915–20. https://doi.org/10.21275/sr24628043205.
Full textWhite, Garry L. "Infrastructure Cyber-Attack Awareness Training." International Journal of Information Security and Privacy 16, no. 1 (2022): 1–26. http://dx.doi.org/10.4018/ijisp.291702.
Full textBoughton, Nick. "Protecting infrastructure from cyber attack." Network Security 2019, no. 4 (2019): 18–19. http://dx.doi.org/10.1016/s1353-4858(19)30051-0.
Full textKelic, Andjelka. "Cyber Risk in Critical Infrastructure." ACM SIGMETRICS Performance Evaluation Review 46, no. 2 (2019): 72–75. http://dx.doi.org/10.1145/3305218.3305243.
Full textRamage, Xavier, Khutso Lebea, and Siphesihle Sithungu. "Cyber Warfare and Critical Infrastructure." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 566–75. https://doi.org/10.34190/eccws.24.1.3526.
Full textRai, Roshan. "From Digital India to Digital Economy: Understanding India's Cyber Infrastructure and Cyber Security." International Journal of Science and Research (IJSR) 10, no. 10 (2021): 1421–26. https://doi.org/10.21275/mr211010171914.
Full textMaliarchuk, Tamara, Yuriy Danyk, and Chad Briggs. "Hybrid Warfare and Cyber Effects in Energy Infrastructure." Connections: The Quarterly Journal 18, no. 1-2 (2019): 93–110. http://dx.doi.org/10.11610/connections.18.1-2.06.
Full textCIAPA, S. "Legal and organizational provision of protection of the critical information infrastructure from cyberattacks." INFORMATION AND LAW, no. 4(39) (December 9, 2021): 121–28. http://dx.doi.org/10.37750/2616-6798.2021.4(39).248832.
Full textKhydyntsev, M. M., V. Yu Zubok, and I. L. Palazhchenko. "Approaches to the Analysis of Sets of Cyber Statistics Indicators." Èlektronnoe modelirovanie 46, no. 6 (2024): 72–96. https://doi.org/10.15407/emodel.46.06.072.
Full textDissertations / Theses on the topic "Cyber-infrastructure"
Naserinia, Vahid. "Cyber resilience for critical infrastructure : A systematic review." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-20155.
Full textBlom, Rikard. "Advanced metering infrastructure reference model with automated cyber security analysis." Thesis, KTH, Elkraftteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-204910.
Full textBoawn, Daniel L. "Cyber counterintelligence, defending the United States' information technology and communications critical infrastructure from Chinese threats." Thesis, Utica College, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1555786.
Full textHawasli, Ahmad. "azureLang: a probabilistic modeling and simulation language for cyber attacks in Microsoft Azure cloud infrastructure." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-240406.
Full textHegde, Srinivas V. "DESIGN AND IMPLEMENTATION OF INTERACTIVE ENERGY MODELS USING CYBER INFRASTRUCTURE FOR ANALYZING CONSUMER AND PRODUCER BEHAVIOR." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1313581394.
Full textHurst, William. "Behavioural observation for critical infrastructure security support." Thesis, Liverpool John Moores University, 2014. http://researchonline.ljmu.ac.uk/4382/.
Full textLane, Sean Theodore. "Vulnerability Analysis of Infrastructure Systems." BYU ScholarsArchive, 2020. https://scholarsarchive.byu.edu/etd/8614.
Full textŠevčík, Michal. "Návrh monitoringu kritické komunikační infrastruktury pro energetickou společnost." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2018. http://www.nusl.cz/ntk/nusl-378335.
Full textEldosouky, Mahmoud Salama Abdelrahman A. "Security of Critical Cyber-Physical Systems: Fundamentals and Optimization." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/90281.
Full textMalik, Muhammad Imran. "BEWARE: A methodical approach to develop BEnign and MalWARE datasets." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2024. https://ro.ecu.edu.au/theses/2790.
Full textBooks on the topic "Cyber-infrastructure"
Saadawi, Tarek, and Louis Jordan Jr, eds. Cyber Infrastructure Protection. Strategic Studies Institute, 2011.
Find full textChinneck, John W., Bjarni Kristjansson, and Matthew J. Saltzman, eds. Operations Research and Cyber-Infrastructure. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-88843-9.
Full textAmoroso, Edward G. Cyber attacks: Protecting national infrastructure. Butterworth-Heinemann, 2012.
Find full textBjarni, Kristjansson, Saltzman Matthew J, Chinneck J. W, and SpringerLink (Online service), eds. Operations Research and Cyber-Infrastructure. Springer US, 2009.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. Challenges remain in securing the nation's cyber infrastructure. U.S. Dept. of Homeland Security, Office of Inspector General, 2007.
Find full textUnited States. Office of Science and Technology Policy. and Critical Technologies Institute (Rand Corporation), eds. The cyber-posture of the national information infrastructure. Rand, 1998.
Find full textNational Infrastructure Protection Center (U.S.). Cyber protests: The threat to the U.S. information infrastructure. National Infrastructure Protection Center, 2001.
Find full textJenny, Lin, Hsiao L. C. Russell, and Project 2049 Institute, eds. The Chinese People's Liberation Army signals intelligence and cyber reconnaissance infrastructure. Project 2049 Institute, 2011.
Find full textG, Cordesman Justin, and Center for Strategic and International Studies (Washington, D.C.), eds. Cyber-threats, information warfare, and critical infrastructure protection: Defending the U.S. homeland. Praeger, 2002.
Find full textBook chapters on the topic "Cyber-infrastructure"
Pelton, Joseph N., and Indu B. Singh. "Protecting Vital Cyber Infrastructure." In Digital Defense. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19953-5_6.
Full textLehto, Martti. "Cyber-Attacks Against Critical Infrastructure." In Computational Methods in Applied Sciences. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-91293-2_1.
Full textKammouh, Omar, and Gian Paolo Cimellaro. "Cyber threat on critical infrastructure." In Routledge Handbook of Sustainable and Resilient Infrastructure. Routledge, 2018. http://dx.doi.org/10.4324/9781315142074-19.
Full textKüfeoğlu, Sinan, and Abdullah Talip Akgün. "Critical infrastructure and cyber resilience frameworks." In Cyber Resilience in Critical Infrastructure. CRC Press, 2023. http://dx.doi.org/10.1201/9781003449522-1.
Full textHart, William E. "Python Optimization Modeling Objects (Pyomo)." In Operations Research and Cyber-Infrastructure. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-88843-9_1.
Full textEngau, Alexander, Miguel F. Anjos, and Anthony Vannelli. "A Primal-Dual Slack Approach to Warmstarting Interior-Point Methods for Linear Programming." In Operations Research and Cyber-Infrastructure. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-88843-9_10.
Full textRaphael, Christopher, and Eric Nichols. "Linear Dynamic Programming and the Training of Sequence Estimators." In Operations Research and Cyber-Infrastructure. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-88843-9_11.
Full textAbadpour, Arash, and Attahiru Sule Alfa. "Approximate Algorithms for Maximizing the Capacity of the Reverse Link in Multiple–Class CDMA Systems." In Operations Research and Cyber-Infrastructure. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-88843-9_12.
Full textCaserta, Marco, Andreas Fink, Andrea Raiconi, Silvia Schwarze, and Stefan Voß. "Mathematical Formulations and Metaheuristics Comparison for the Push-Tree Problem." In Operations Research and Cyber-Infrastructure. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-88843-9_13.
Full textKonak, Abdullah, Sadan Kulturel-Konak, and Alice E. Smith. "Two-Edge Disjoint Survivable Network Design Problem with Relays." In Operations Research and Cyber-Infrastructure. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-88843-9_14.
Full textConference papers on the topic "Cyber-infrastructure"
Pal, Ranjan, Rohan Xavier Sequeira, Sander Zeijlmaker, and Michael Siegel. "Optimizing Cyber-Resilience in Critical Infrastructure Networks." In 2024 Winter Simulation Conference (WSC). IEEE, 2024. https://doi.org/10.1109/wsc63780.2024.10838999.
Full textArunkumar, D. T., Trapty Agarwal, and Ramakant Upadhyay. "Mitigating Cyber Threats in Critical Infrastructure: A Technical Analysis." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725822.
Full textZou, Xing, and Ning Hu. "Cyber-Range: the Scientific Infrastructure for Cyberspace Security Research." In 2024 IEEE 9th International Conference on Data Science in Cyberspace (DSC). IEEE, 2024. https://doi.org/10.1109/dsc63484.2024.00032.
Full textBrintha, N. C., Veera Seshu Chikkam, Pravallika Chinthati, Leburi Sriram, and Mitish Kumar Vema. "A Quantum-Based Approach Against Cyber Attacks in Electrical Infrastructure." In 2024 Parul International Conference on Engineering and Technology (PICET). IEEE, 2024. http://dx.doi.org/10.1109/picet60765.2024.10716126.
Full textHoffman, Patricia. "Energy infrastructure cyber protection." In the Seventh Annual Workshop. ACM Press, 2011. http://dx.doi.org/10.1145/2179298.2179300.
Full textDugas, Diana V., and D. Brian Ormand. "Cyber Infrastructure: Training and Mentoring." In PEARC '19: Practice and Experience in Advanced Research Computing. ACM, 2019. http://dx.doi.org/10.1145/3332186.3332243.
Full textEstisonMugilila Camachi, Balduino, Loretta Ichim, and Dan Popescu. "Cyber Security of Smart Grid Infrastructure." In 2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI). IEEE, 2018. http://dx.doi.org/10.1109/saci.2018.8441017.
Full textPandey, Rajendra Kumar, and Mohit Misra. "Cyber security threats — Smart grid infrastructure." In 2016 19th National Power Systems Conference (NPSC). IEEE, 2016. http://dx.doi.org/10.1109/npsc.2016.7858950.
Full textSontowski, Sina, Maanak Gupta, Sai Sree Laya Chukkapalli, et al. "Cyber Attacks on Smart Farming Infrastructure." In 2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC). IEEE, 2020. http://dx.doi.org/10.1109/cic50333.2020.00025.
Full textRajasekar, Arcot, Reagan W. Moore, Mike Wan, and Wayne Schroeder. "Cyber infrastructure for Community Remote Sensing." In IGARSS 2010 - 2010 IEEE International Geoscience and Remote Sensing Symposium. IEEE, 2010. http://dx.doi.org/10.1109/igarss.2010.5650855.
Full textReports on the topic "Cyber-infrastructure"
Saadawi, Tarek, Jr Jordan, and Louis. Cyber Infrastructure Protection. Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada543040.
Full textWacker, Michael R. Cyber Infrastructure: The Forgotten Vulnerability. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada612150.
Full textPhillips, Laurence R., Andjelka Kelic, and Drake E. Warren. Cyber and physical infrastructure interdependencies. Office of Scientific and Technical Information (OSTI), 2008. http://dx.doi.org/10.2172/945905.
Full textKeliiaa, Curtis M. TCIA Secure Cyber Critical Infrastructure Modernization. Office of Scientific and Technical Information (OSTI), 2017. http://dx.doi.org/10.2172/1367474.
Full textFrenklach, Michael, and Michael Gutkin. Development of Prime Cyber-Infrastructure for Combustion. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada524180.
Full textHutchins, Margot J., Derek H. Hart, Jason E. Stamp, and Robert Forrest. Building the Scientific Basis for Cyber Resilience of Critical Infrastructure. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1603854.
Full textBurrow, Brian P. Engaging the Nation's Critical Infrastructure Sector to Deter Cyber Threats. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada589059.
Full textVinson, Nigel, and Simon Brawley. Critical infrastructure: readiness, resilience, and security. Parliamentary Office of Science and Technology, 2024. https://doi.org/10.58248/hs81.
Full textSheldon, Frederick T., Lawrence Paul MacIntyre, Hamed Okhravi, and Dr John C. Munson. Data Diodes in Support of a Power Grid Trustworthy Cyber Infrastructure. Office of Scientific and Technical Information (OSTI), 2009. http://dx.doi.org/10.2172/978823.
Full textDawson, Lon Andrew, and Jennifer A. Stinebaugh. Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies. Office of Scientific and Technical Information (OSTI), 2010. http://dx.doi.org/10.2172/1028958.
Full text