Academic literature on the topic 'Cyber-infrastructure'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber-infrastructure.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cyber-infrastructure"

1

MANUILOV, Y. "Cyber security of critical infrastructure during cyber warfare." INFORMATION AND LAW, no. 1(44) (March 28, 2023): 154–67. http://dx.doi.org/10.37750/2616-6798.2023.1(44).287780.

Full text
Abstract:
The concepts and characteristics of critical infrastructure are defined. The role and place of critical infrastructure in the structure of national security of Ukraine is highlighted. The factors that affect the security of critical infrastructure are detailed. The principles of state policy in the field of cyber security of critical infrastructure are outlined. The threats that affect the security of critical infrastructure in the conditions of cyber warfare have been identified. The expediency of conducting periodic reviews of the state of cyber security of critical infrastructure of strateg
APA, Harvard, Vancouver, ISO, and other styles
2

Satya Praveen Kumar, Naga. "Cybersecurity and Cyber Attacks in Cloud Infrastructure." International Journal of Science and Research (IJSR) 12, no. 4 (2023): 1915–20. https://doi.org/10.21275/sr24628043205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

White, Garry L. "Infrastructure Cyber-Attack Awareness Training." International Journal of Information Security and Privacy 16, no. 1 (2022): 1–26. http://dx.doi.org/10.4018/ijisp.291702.

Full text
Abstract:
The purpose of this study is to provide insight as to how infrastructure countermeasures awareness training will impact individuals dealing with a nationwide catastrophic cyber-attack. Can this awareness training lessen the psychological effect of an attack? This study showed no value for this type of training. Reading about such an attack, the subjects had lower technical optimism and cyber self-efficacy. Reading about infrastructure countermeasures, before or after reading about a cyber-attack, did not improve or maintain the subjects’ optimism and self-efficacy. A possible explanation is th
APA, Harvard, Vancouver, ISO, and other styles
4

Boughton, Nick. "Protecting infrastructure from cyber attack." Network Security 2019, no. 4 (2019): 18–19. http://dx.doi.org/10.1016/s1353-4858(19)30051-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kelic, Andjelka. "Cyber Risk in Critical Infrastructure." ACM SIGMETRICS Performance Evaluation Review 46, no. 2 (2019): 72–75. http://dx.doi.org/10.1145/3305218.3305243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ramage, Xavier, Khutso Lebea, and Siphesihle Sithungu. "Cyber Warfare and Critical Infrastructure." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 566–75. https://doi.org/10.34190/eccws.24.1.3526.

Full text
Abstract:
This paper identifies the growing threat that cyber warfare poses to a country's Critical Infrastructure (CI) and the Critical Information Infrastructure (CII) that accompanies it. CI is a term that describes all of the essential systems and services needed for the nation to function. CII describes the Information Systems responsible for the CI's operation. This includes energy grids, finance, water supplies, transportation, and healthcare facilities. This paper will focus mainly on the CI related to energy grids and finance. With the growing integration of digital technologies into these sect
APA, Harvard, Vancouver, ISO, and other styles
7

Rai, Roshan. "From Digital India to Digital Economy: Understanding India's Cyber Infrastructure and Cyber Security." International Journal of Science and Research (IJSR) 10, no. 10 (2021): 1421–26. https://doi.org/10.21275/mr211010171914.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Maliarchuk, Tamara, Yuriy Danyk, and Chad Briggs. "Hybrid Warfare and Cyber Effects in Energy Infrastructure." Connections: The Quarterly Journal 18, no. 1-2 (2019): 93–110. http://dx.doi.org/10.11610/connections.18.1-2.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

CIAPA, S. "Legal and organizational provision of protection of the critical information infrastructure from cyberattacks." INFORMATION AND LAW, no. 4(39) (December 9, 2021): 121–28. http://dx.doi.org/10.37750/2616-6798.2021.4(39).248832.

Full text
Abstract:
The article considers the legal and organizational aspects of ensuring the protection of the critical information infrastructure from cyberattacks. Attention is drawn to the positive experience of the United States in ensuring the resilience of the objects of critical infrastructure. The provisions of the new Cyber Security Strategy of Ukraine are analyzed, one of the priorities of which is to improve the regulatory framework for cyber security of critical information infrastructure. The shortcomings of the previous Cyber Security Strategy of Ukraine (2016) are noted. Contains a detailed analy
APA, Harvard, Vancouver, ISO, and other styles
10

Khydyntsev, M. M., V. Yu Zubok, and I. L. Palazhchenko. "Approaches to the Analysis of Sets of Cyber Statistics Indicators." Èlektronnoe modelirovanie 46, no. 6 (2024): 72–96. https://doi.org/10.15407/emodel.46.06.072.

Full text
Abstract:
The work is devoted to solving the urgent problem of assessing cybersecurity, the state of cyber defense, cyber resilience (cyber resilience) at the facility, sectoral, national and interna-tional levels by forming sets and analyzing cyber statistics data, which is gradually being sepa-rated into a special area of cybersecurity. The terminological base for collecting and processing cyber statistics data was analyzed and developed as well as the existing and new approaches to the formation of sets of cyber statistics indicators were proposed. Existing practices (established practices, framework
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cyber-infrastructure"

1

Naserinia, Vahid. "Cyber resilience for critical infrastructure : A systematic review." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-20155.

Full text
Abstract:
Critical infrastructure is a term to define the network of crucial assets for the functioning of a society and modern economies. The complexity of critical infrastructures and the ability to connect smart devices to these networks make them more vulnerable to cyberattacks. One of the cutting events pointing out gaps and importance of the cyber resilience in the nation's infrastructure systems, including Industrial Control Systems (ICS), was the discovery of Stuxnet in 2010, a malicious computer worm attacking Iranian nuclear facilities. The vulnerability of cyber systems was further revealed b
APA, Harvard, Vancouver, ISO, and other styles
2

Blom, Rikard. "Advanced metering infrastructure reference model with automated cyber security analysis." Thesis, KTH, Elkraftteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-204910.

Full text
Abstract:
European Union has set a target to install nearly 200 million smart metersspread over Europe before 2020, this leads into a vast increase of sensitiveinformation flow for Distribution System Operators (DSO’s), simultaneously thisleads to raised cyber security threats. The in and outgoing information of the DSOneeds to be processed and stored by different Information technology (IT)- andOperational Technology (OT)-systems depending on the information. High demandsare therefore required of the enterprise cyber security to be able to protect theenterprise IT- and OT-systems. Sensitive customer in
APA, Harvard, Vancouver, ISO, and other styles
3

Boawn, Daniel L. "Cyber counterintelligence, defending the United States' information technology and communications critical infrastructure from Chinese threats." Thesis, Utica College, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1555786.

Full text
Abstract:
<p>Cyber counterintelligence (CCI) could be the United States' best defense against Chinese cyber aggression of Critical Infrastructure and Key Resources (CIKR). The need to defend CIKR is essential to public safety and national defense. As technology evolves and continues to march towards the inevitable connectedness that brings systems in sync with one another, the United States becomes more vulnerable. Of the 16 total sector specific areas of United States&rsquo; assets, the Communications and Information Technology (IT) sectors are constantly under attack from threats both foreign and dome
APA, Harvard, Vancouver, ISO, and other styles
4

Hawasli, Ahmad. "azureLang: a probabilistic modeling and simulation language for cyber attacks in Microsoft Azure cloud infrastructure." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-240406.

Full text
Abstract:
Cyber-attack simulation is a suitable method used for assessing the security ofnetwork systems. An attack simulation advances step-wise from a certain systementry-point to explore the attack paths that lead to dierent weaknesses inthe model. Each step is analyzed, and the time to compromise is calculated.Attack simulations are primarily based on attack graphs. The graphs areemployed to model attack steps where nodes can represent assets in the system,and edges can represent the attack steps. To reduce the computational cost associatedwith building an attack graph for each specic system, domain
APA, Harvard, Vancouver, ISO, and other styles
5

Hegde, Srinivas V. "DESIGN AND IMPLEMENTATION OF INTERACTIVE ENERGY MODELS USING CYBER INFRASTRUCTURE FOR ANALYZING CONSUMER AND PRODUCER BEHAVIOR." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1313581394.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hurst, William. "Behavioural observation for critical infrastructure security support." Thesis, Liverpool John Moores University, 2014. http://researchonline.ljmu.ac.uk/4382/.

Full text
Abstract:
Critical infrastructures include sectors such as energy resources, finance, food and water distribution, health, manufacturing and government services. In recent years, critical infrastructures have become increasingly dependent on ICT; more interconnected and are often, as a result, linked to the Internet. Consequently, this makes these systems more vulnerable and increases the threat of cyber-attack. In addition, the growing use of wireless networks means that infrastructures can be more susceptible to a direct digital attack than ever before. Traditionally, protecting against environmental
APA, Harvard, Vancouver, ISO, and other styles
7

Lane, Sean Theodore. "Vulnerability Analysis of Infrastructure Systems." BYU ScholarsArchive, 2020. https://scholarsarchive.byu.edu/etd/8614.

Full text
Abstract:
Complex cyber-physical systems have become fundamental to modern society by effectively providing critical services and improving efficiency in various domains. Unfortunately, as systems become more connected and more complex, they also can become more vulnerable and less robust. As a result, various failure modes become more common and easily triggered from both unanticipated and malicious perturbations. Research has been conducted in the area of vulnerability analysis for cyber-physical systems, to assist in locating these possible vulnerabilities before they can fail. I present two case st
APA, Harvard, Vancouver, ISO, and other styles
8

Ševčík, Michal. "Návrh monitoringu kritické komunikační infrastruktury pro energetickou společnost." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2018. http://www.nusl.cz/ntk/nusl-378335.

Full text
Abstract:
Diploma thesis deals with monitoring critical infrastructure, critical information infrastructure and network monitoring in energetic industry. The goal is to create analytical environment for processing logs from the network, to map the most critical segments of the network and implementation of monitoring and network devices, that increase security and mitigate risks of security events or security incidents
APA, Harvard, Vancouver, ISO, and other styles
9

Eldosouky, Mahmoud Salama Abdelrahman A. "Security of Critical Cyber-Physical Systems: Fundamentals and Optimization." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/90281.

Full text
Abstract:
Cyber-physical systems (CPSs) are systems that integrate physical elements with a cyber layer that enables sensing, monitoring, and processing the data from the physical components. Examples of CPSs include autonomous vehicles, unmanned aerial vehicles (UAVs), smart grids, and the Internet of Things (IoT). In particular, many critical infrastructure (CI) that are vital to our modern day cities and communities, are CPSs. This wide range of CPSs domains represents a cornerstone of smart cities in which various CPSs are connected to provide efficient services. However, this level of connectivity
APA, Harvard, Vancouver, ISO, and other styles
10

Malik, Muhammad Imran. "BEWARE: A methodical approach to develop BEnign and MalWARE datasets." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2024. https://ro.ecu.edu.au/theses/2790.

Full text
Abstract:
Cyber-Physical Systems (CPSes) are continually advancing in many Critical Infrastructure (CI) sectors, such as energy, healthcare, the military, and telecommunication. These systems are persistently targeted by nation-sponsored cyber criminal groups, who continuously refine their techniques and attack methods. Malicious software (malware) attacks are the most common of these tactics and can have severe consequences, as observed in the Stuxnet, BlackEnergy, Industroyer, and Triton attacks. A dataset consisting of validated benign and malware samples is a fundamental ingredient in developing sol
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Cyber-infrastructure"

1

Saadawi, Tarek Nazir. Cyber infrastructure protection. Lulu Com, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Saadawi, Tarek, and Louis Jordan Jr, eds. Cyber Infrastructure Protection. Strategic Studies Institute, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chinneck, John W., Bjarni Kristjansson, and Matthew J. Saltzman, eds. Operations Research and Cyber-Infrastructure. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-88843-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Amoroso, Edward G. Cyber attacks: Protecting national infrastructure. Butterworth-Heinemann, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bjarni, Kristjansson, Saltzman Matthew J, Chinneck J. W, and SpringerLink (Online service), eds. Operations Research and Cyber-Infrastructure. Springer US, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

United States. Department of Homeland Security. Office of Inspector General. Challenges remain in securing the nation's cyber infrastructure. U.S. Dept. of Homeland Security, Office of Inspector General, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United States. Office of Science and Technology Policy. and Critical Technologies Institute (Rand Corporation), eds. The cyber-posture of the national information infrastructure. Rand, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

National Infrastructure Protection Center (U.S.). Cyber protests: The threat to the U.S. information infrastructure. National Infrastructure Protection Center, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jenny, Lin, Hsiao L. C. Russell, and Project 2049 Institute, eds. The Chinese People's Liberation Army signals intelligence and cyber reconnaissance infrastructure. Project 2049 Institute, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

G, Cordesman Justin, and Center for Strategic and International Studies (Washington, D.C.), eds. Cyber-threats, information warfare, and critical infrastructure protection: Defending the U.S. homeland. Praeger, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cyber-infrastructure"

1

Pelton, Joseph N., and Indu B. Singh. "Protecting Vital Cyber Infrastructure." In Digital Defense. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19953-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lehto, Martti. "Cyber-Attacks Against Critical Infrastructure." In Computational Methods in Applied Sciences. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-91293-2_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kammouh, Omar, and Gian Paolo Cimellaro. "Cyber threat on critical infrastructure." In Routledge Handbook of Sustainable and Resilient Infrastructure. Routledge, 2018. http://dx.doi.org/10.4324/9781315142074-19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Küfeoğlu, Sinan, and Abdullah Talip Akgün. "Critical infrastructure and cyber resilience frameworks." In Cyber Resilience in Critical Infrastructure. CRC Press, 2023. http://dx.doi.org/10.1201/9781003449522-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hart, William E. "Python Optimization Modeling Objects (Pyomo)." In Operations Research and Cyber-Infrastructure. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-88843-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Engau, Alexander, Miguel F. Anjos, and Anthony Vannelli. "A Primal-Dual Slack Approach to Warmstarting Interior-Point Methods for Linear Programming." In Operations Research and Cyber-Infrastructure. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-88843-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Raphael, Christopher, and Eric Nichols. "Linear Dynamic Programming and the Training of Sequence Estimators." In Operations Research and Cyber-Infrastructure. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-88843-9_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Abadpour, Arash, and Attahiru Sule Alfa. "Approximate Algorithms for Maximizing the Capacity of the Reverse Link in Multiple–Class CDMA Systems." In Operations Research and Cyber-Infrastructure. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-88843-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Caserta, Marco, Andreas Fink, Andrea Raiconi, Silvia Schwarze, and Stefan Voß. "Mathematical Formulations and Metaheuristics Comparison for the Push-Tree Problem." In Operations Research and Cyber-Infrastructure. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-88843-9_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Konak, Abdullah, Sadan Kulturel-Konak, and Alice E. Smith. "Two-Edge Disjoint Survivable Network Design Problem with Relays." In Operations Research and Cyber-Infrastructure. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-88843-9_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cyber-infrastructure"

1

Pal, Ranjan, Rohan Xavier Sequeira, Sander Zeijlmaker, and Michael Siegel. "Optimizing Cyber-Resilience in Critical Infrastructure Networks." In 2024 Winter Simulation Conference (WSC). IEEE, 2024. https://doi.org/10.1109/wsc63780.2024.10838999.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Arunkumar, D. T., Trapty Agarwal, and Ramakant Upadhyay. "Mitigating Cyber Threats in Critical Infrastructure: A Technical Analysis." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zou, Xing, and Ning Hu. "Cyber-Range: the Scientific Infrastructure for Cyberspace Security Research." In 2024 IEEE 9th International Conference on Data Science in Cyberspace (DSC). IEEE, 2024. https://doi.org/10.1109/dsc63484.2024.00032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brintha, N. C., Veera Seshu Chikkam, Pravallika Chinthati, Leburi Sriram, and Mitish Kumar Vema. "A Quantum-Based Approach Against Cyber Attacks in Electrical Infrastructure." In 2024 Parul International Conference on Engineering and Technology (PICET). IEEE, 2024. http://dx.doi.org/10.1109/picet60765.2024.10716126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hoffman, Patricia. "Energy infrastructure cyber protection." In the Seventh Annual Workshop. ACM Press, 2011. http://dx.doi.org/10.1145/2179298.2179300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dugas, Diana V., and D. Brian Ormand. "Cyber Infrastructure: Training and Mentoring." In PEARC '19: Practice and Experience in Advanced Research Computing. ACM, 2019. http://dx.doi.org/10.1145/3332186.3332243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

EstisonMugilila Camachi, Balduino, Loretta Ichim, and Dan Popescu. "Cyber Security of Smart Grid Infrastructure." In 2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI). IEEE, 2018. http://dx.doi.org/10.1109/saci.2018.8441017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pandey, Rajendra Kumar, and Mohit Misra. "Cyber security threats — Smart grid infrastructure." In 2016 19th National Power Systems Conference (NPSC). IEEE, 2016. http://dx.doi.org/10.1109/npsc.2016.7858950.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sontowski, Sina, Maanak Gupta, Sai Sree Laya Chukkapalli, et al. "Cyber Attacks on Smart Farming Infrastructure." In 2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC). IEEE, 2020. http://dx.doi.org/10.1109/cic50333.2020.00025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rajasekar, Arcot, Reagan W. Moore, Mike Wan, and Wayne Schroeder. "Cyber infrastructure for Community Remote Sensing." In IGARSS 2010 - 2010 IEEE International Geoscience and Remote Sensing Symposium. IEEE, 2010. http://dx.doi.org/10.1109/igarss.2010.5650855.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cyber-infrastructure"

1

Saadawi, Tarek, Jr Jordan, and Louis. Cyber Infrastructure Protection. Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada543040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wacker, Michael R. Cyber Infrastructure: The Forgotten Vulnerability. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada612150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Phillips, Laurence R., Andjelka Kelic, and Drake E. Warren. Cyber and physical infrastructure interdependencies. Office of Scientific and Technical Information (OSTI), 2008. http://dx.doi.org/10.2172/945905.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Keliiaa, Curtis M. TCIA Secure Cyber Critical Infrastructure Modernization. Office of Scientific and Technical Information (OSTI), 2017. http://dx.doi.org/10.2172/1367474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Frenklach, Michael, and Michael Gutkin. Development of Prime Cyber-Infrastructure for Combustion. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada524180.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hutchins, Margot J., Derek H. Hart, Jason E. Stamp, and Robert Forrest. Building the Scientific Basis for Cyber Resilience of Critical Infrastructure. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1603854.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Burrow, Brian P. Engaging the Nation's Critical Infrastructure Sector to Deter Cyber Threats. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada589059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vinson, Nigel, and Simon Brawley. Critical infrastructure: readiness, resilience, and security. Parliamentary Office of Science and Technology, 2024. https://doi.org/10.58248/hs81.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sheldon, Frederick T., Lawrence Paul MacIntyre, Hamed Okhravi, and Dr John C. Munson. Data Diodes in Support of a Power Grid Trustworthy Cyber Infrastructure. Office of Scientific and Technical Information (OSTI), 2009. http://dx.doi.org/10.2172/978823.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dawson, Lon Andrew, and Jennifer A. Stinebaugh. Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies. Office of Scientific and Technical Information (OSTI), 2010. http://dx.doi.org/10.2172/1028958.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!