To see the other types of publications on this topic, follow the link: Cyber-infrastructure.

Dissertations / Theses on the topic 'Cyber-infrastructure'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 32 dissertations / theses for your research on the topic 'Cyber-infrastructure.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Naserinia, Vahid. "Cyber resilience for critical infrastructure : A systematic review." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-20155.

Full text
Abstract:
Critical infrastructure is a term to define the network of crucial assets for the functioning of a society and modern economies. The complexity of critical infrastructures and the ability to connect smart devices to these networks make them more vulnerable to cyberattacks. One of the cutting events pointing out gaps and importance of the cyber resilience in the nation's infrastructure systems, including Industrial Control Systems (ICS), was the discovery of Stuxnet in 2010, a malicious computer worm attacking Iranian nuclear facilities. The vulnerability of cyber systems was further revealed b
APA, Harvard, Vancouver, ISO, and other styles
2

Blom, Rikard. "Advanced metering infrastructure reference model with automated cyber security analysis." Thesis, KTH, Elkraftteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-204910.

Full text
Abstract:
European Union has set a target to install nearly 200 million smart metersspread over Europe before 2020, this leads into a vast increase of sensitiveinformation flow for Distribution System Operators (DSO’s), simultaneously thisleads to raised cyber security threats. The in and outgoing information of the DSOneeds to be processed and stored by different Information technology (IT)- andOperational Technology (OT)-systems depending on the information. High demandsare therefore required of the enterprise cyber security to be able to protect theenterprise IT- and OT-systems. Sensitive customer in
APA, Harvard, Vancouver, ISO, and other styles
3

Boawn, Daniel L. "Cyber counterintelligence, defending the United States' information technology and communications critical infrastructure from Chinese threats." Thesis, Utica College, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1555786.

Full text
Abstract:
<p>Cyber counterintelligence (CCI) could be the United States' best defense against Chinese cyber aggression of Critical Infrastructure and Key Resources (CIKR). The need to defend CIKR is essential to public safety and national defense. As technology evolves and continues to march towards the inevitable connectedness that brings systems in sync with one another, the United States becomes more vulnerable. Of the 16 total sector specific areas of United States&rsquo; assets, the Communications and Information Technology (IT) sectors are constantly under attack from threats both foreign and dome
APA, Harvard, Vancouver, ISO, and other styles
4

Hawasli, Ahmad. "azureLang: a probabilistic modeling and simulation language for cyber attacks in Microsoft Azure cloud infrastructure." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-240406.

Full text
Abstract:
Cyber-attack simulation is a suitable method used for assessing the security ofnetwork systems. An attack simulation advances step-wise from a certain systementry-point to explore the attack paths that lead to dierent weaknesses inthe model. Each step is analyzed, and the time to compromise is calculated.Attack simulations are primarily based on attack graphs. The graphs areemployed to model attack steps where nodes can represent assets in the system,and edges can represent the attack steps. To reduce the computational cost associatedwith building an attack graph for each specic system, domain
APA, Harvard, Vancouver, ISO, and other styles
5

Hegde, Srinivas V. "DESIGN AND IMPLEMENTATION OF INTERACTIVE ENERGY MODELS USING CYBER INFRASTRUCTURE FOR ANALYZING CONSUMER AND PRODUCER BEHAVIOR." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1313581394.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hurst, William. "Behavioural observation for critical infrastructure security support." Thesis, Liverpool John Moores University, 2014. http://researchonline.ljmu.ac.uk/4382/.

Full text
Abstract:
Critical infrastructures include sectors such as energy resources, finance, food and water distribution, health, manufacturing and government services. In recent years, critical infrastructures have become increasingly dependent on ICT; more interconnected and are often, as a result, linked to the Internet. Consequently, this makes these systems more vulnerable and increases the threat of cyber-attack. In addition, the growing use of wireless networks means that infrastructures can be more susceptible to a direct digital attack than ever before. Traditionally, protecting against environmental
APA, Harvard, Vancouver, ISO, and other styles
7

Lane, Sean Theodore. "Vulnerability Analysis of Infrastructure Systems." BYU ScholarsArchive, 2020. https://scholarsarchive.byu.edu/etd/8614.

Full text
Abstract:
Complex cyber-physical systems have become fundamental to modern society by effectively providing critical services and improving efficiency in various domains. Unfortunately, as systems become more connected and more complex, they also can become more vulnerable and less robust. As a result, various failure modes become more common and easily triggered from both unanticipated and malicious perturbations. Research has been conducted in the area of vulnerability analysis for cyber-physical systems, to assist in locating these possible vulnerabilities before they can fail. I present two case st
APA, Harvard, Vancouver, ISO, and other styles
8

Ševčík, Michal. "Návrh monitoringu kritické komunikační infrastruktury pro energetickou společnost." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2018. http://www.nusl.cz/ntk/nusl-378335.

Full text
Abstract:
Diploma thesis deals with monitoring critical infrastructure, critical information infrastructure and network monitoring in energetic industry. The goal is to create analytical environment for processing logs from the network, to map the most critical segments of the network and implementation of monitoring and network devices, that increase security and mitigate risks of security events or security incidents
APA, Harvard, Vancouver, ISO, and other styles
9

Eldosouky, Mahmoud Salama Abdelrahman A. "Security of Critical Cyber-Physical Systems: Fundamentals and Optimization." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/90281.

Full text
Abstract:
Cyber-physical systems (CPSs) are systems that integrate physical elements with a cyber layer that enables sensing, monitoring, and processing the data from the physical components. Examples of CPSs include autonomous vehicles, unmanned aerial vehicles (UAVs), smart grids, and the Internet of Things (IoT). In particular, many critical infrastructure (CI) that are vital to our modern day cities and communities, are CPSs. This wide range of CPSs domains represents a cornerstone of smart cities in which various CPSs are connected to provide efficient services. However, this level of connectivity
APA, Harvard, Vancouver, ISO, and other styles
10

Malik, Muhammad Imran. "BEWARE: A methodical approach to develop BEnign and MalWARE datasets." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2024. https://ro.ecu.edu.au/theses/2790.

Full text
Abstract:
Cyber-Physical Systems (CPSes) are continually advancing in many Critical Infrastructure (CI) sectors, such as energy, healthcare, the military, and telecommunication. These systems are persistently targeted by nation-sponsored cyber criminal groups, who continuously refine their techniques and attack methods. Malicious software (malware) attacks are the most common of these tactics and can have severe consequences, as observed in the Stuxnet, BlackEnergy, Industroyer, and Triton attacks. A dataset consisting of validated benign and malware samples is a fundamental ingredient in developing sol
APA, Harvard, Vancouver, ISO, and other styles
11

Strachová, Zuzana. "Implementace nástroje pro řízení kybernetické bezpečnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444573.

Full text
Abstract:
The thesis is focused on the implementation of a software tool to increase the effectiveness of cyber security management. The tool is implemented in a company preparing to be classified as a part of critical information infrastructure. Based on the customer's requirements, a suitable cyber security management tool is selected. Subsequently, I propose a methodology for implementing the tool, which I immediately apply. The output of the work is an implemented tool, risk analysis and security documentation required by law.
APA, Harvard, Vancouver, ISO, and other styles
12

Hraboš, Šimon. "Virtualizace energetické infrastruktury." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442400.

Full text
Abstract:
This work describes the virtualization process, virtualization tools and virtualization automation. The work also deals with the description of energy infrastructure, KYPO cyber range platform and DLMS/COSEM protocol used in energy. The practical part deals with the virtualization of energy infrastructure using OpenStack and KYPO cyber range platforms. A virtual environment was created using Vagrant application. The OpenStack and KYPO cyber range platforms were subsequently installed in this environment. Next, a sandbox definition was created. The sandbox definition creates a scenario with an
APA, Harvard, Vancouver, ISO, and other styles
13

Sinopoli, Anthony F. "Cyberwar and International Law: An English School Perspective." Scholar Commons, 2012. http://scholarcommons.usf.edu/etd/4404.

Full text
Abstract:
Cyberwar challenges future endeavors of state security. As technological capability has improved, and access to information has become more widespread the importance of the issue in today's ever-globalizing world grows each day. A primary objective is to evaluate the place of cyber-warfare against nation-states and any repercussions under an international law paradigm. Utilizing an English School perspective, emphasis will be applied to the argument that disruptive circumstances could come to fruition if international conventions are not created to bring consensus and order among nation-sta
APA, Harvard, Vancouver, ISO, and other styles
14

Akbar, Yousef M. A. H. "Intrusion Detection of Flooding DoS Attacks on Emulated Smart Meters." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/98554.

Full text
Abstract:
The power grid has changed a great deal from what has been generally viewed as a traditional power grid. The modernization of the power grid has seen an increase in the integration and incorporation of computing and communication elements, creating an interdependence of both physical and cyber assets of the power grid. The fast-increasing connectivity has transformed the grid from what used to be primarily a physical system into a Cyber- Physical System (CPS). The physical elements within a power grid are well understood by power engineers; however, the newly deployed cyber aspects are new to
APA, Harvard, Vancouver, ISO, and other styles
15

Draganov, Vojtěch. "Zákon o kybernetické bezpečnosti a jeho dopady na povinné subjekty." Master's thesis, Vysoká škola ekonomická v Praze, 2016. http://www.nusl.cz/ntk/nusl-205657.

Full text
Abstract:
The thesis looks into the act No. 181/2014 Coll. Cyber Security Act (hereinafter referred to as "CSA") and its impact on obliged entities with focus on the regional authorities of the Czech Republic. The thesis starts with introduction into the issue of the CSA and cybersecurity from the point of view of the state, subsequently it refocuses on the level of regulated organizations. The main pillar and contribution of the thesis is the CSA analysis with the aim to identify impact of the CSA in the obliged entities. Based on this analysis author designed the questionnaire survey of the CSA impact
APA, Harvard, Vancouver, ISO, and other styles
16

Kroupová, Hana. "Metodika asistovaného zhodnocení." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-402066.

Full text
Abstract:
The master‘s thesis is focused on security audit. The aim of this thesis is to create methodology, which might help with creating security audits and research current condition of cybernetic and information security in a business establishment. Theoretical part explains basic terms and concepts about cyber and information security. Own interpretation consist description of methodological areas of security audit.
APA, Harvard, Vancouver, ISO, and other styles
17

Doubková, Veronika. "Bezpečnostní rizika podle standardu ISO 27001." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-412984.

Full text
Abstract:
This diploma thesis deals with the management of security information, according to ISO/IEC 27005 and it is implementation in the Verinice software environment. The risk information management process is applied to a critical infrastructure, that is connected to a optical fiber network. The work focuses on incidents aimed at threatening data from optical threats and active network elements in transmission systems. The result of the work is defined as a risk file in the .VNA format containing identified risks, for which appropriate measures are implemented in connection with the requirements of
APA, Harvard, Vancouver, ISO, and other styles
18

Oliparambil, Shanmughan Vivek. "Lightweight Environment for Cyber Security Education." ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2390.

Full text
Abstract:
The use of physical systems and Virtual Machines has become inefficient and expensive for creating tailored, hands-on exercises for providing cyber security training. The main purpose of this project is to directly address these issues faced in cyber security education with the help of Docker containers. Using Docker, a lightweight and automated platform was developed for creating, sharing, and managing hands-on exercises. With the help of orchestration tools, this platform provides a centralized point to monitor and control the systems and exercises with a high degree of automation. In a clas
APA, Harvard, Vancouver, ISO, and other styles
19

Zhang, Xin. "Secure Data Management and Transmission Infrastructure for the Future Smart Grid." Thesis, The University of Sydney, 2016. http://hdl.handle.net/2123/14657.

Full text
Abstract:
Power grid has played a crucial role since its inception in the Industrial Age. It has evolved from a wide network supplying energy for incorporated multiple areas to the largest cyber-physical system. Its security and reliability are crucial to any country’s economy and stability [1]. With the emergence of the new technologies and the growing pressure of the global warming, the aging power grid can no longer meet the requirements of the modern industry, which leads to the proposal of ‘smart grid’. In smart grid, both electricity and control information communicate in a massively distributed p
APA, Harvard, Vancouver, ISO, and other styles
20

Pospíšil, Petr. "Správa uživatelů jako zdroje rizik." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-318614.

Full text
Abstract:
This diploma thesis focuses on human resources mainly in Critical information infrastructure and Important information systems. Thesis focuses on the most frequent threats for users and design possible model of threat reduction. Integral part of results is designing of effective security awareness education program according to the Law on Cyber Security.
APA, Harvard, Vancouver, ISO, and other styles
21

Sayad, Khaled. "Cross-domain Resilience in Cloud-native, Critical Cyber-Physical Systems Networks : Availability Modeling, Analysis, and Optimization of Critical Services Provisioning." Electronic Thesis or Diss., université Paris-Saclay, 2024. http://www.theses.fr/2024UPAST028.

Full text
Abstract:
La résilience des Infrastructures Critiques (ICs) est cruciale pour assurer la sécurité et la stabilité socio-économique dans la société moderne. Ces ICs s'appuient sur un réseau complexe de systèmes cyber-physiques (SCPs) couvrant plusieurs domaines tels que les télécommunications et l'énergie, an de garantir un flux continu de services critiques.L'évolution du mode opérationnel des ICs modernes, illustré par l'intégration accrue des technologies cloud-natif dans les réseaux SCPs sous-jacents, introduit de nouveaux dés en termes de résilience face aux cyber-risques, qui s'ajoute au problème d
APA, Harvard, Vancouver, ISO, and other styles
22

VITALI, DOMENICO. "On the cyber security issues of the internet infrastructure." Doctoral thesis, 2013. http://hdl.handle.net/11573/918298.

Full text
Abstract:
The Internet network has received huge attentions by the research community. At a first glance, the network optimization and scalability issues dominate the efforts of researchers and vendors. Many results have been obtained in the last decades: the Internet’s architecture is optimized to be cheap, robust and ubiquitous. In contrast, such a network has never been perfectly secure. During all its evolution, the security threats of the Internet persist as a transversal and endless topic. Nowadays, the Internet network hosts a multitude of mission critical activities. The electronic voting system
APA, Harvard, Vancouver, ISO, and other styles
23

Singh, Sandeep Kumar. "Cyber-physical security of smart grid and advanced metering infrastructure." Thesis, 2018. http://localhost:8080/xmlui/handle/12345678/7772.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Han, Song doctor of computer sciences. "Networking infrastructure and data management for large-scale cyber-physical systems." 2012. http://hdl.handle.net/2152/19581.

Full text
Abstract:
A cyber-physical system (CPS) is a system featuring a tight combination of, and coordination between, the system’s computational and physical elements. A large-scale CPS usually consists of several subsystems which are formed by networked sensors and actuators, and deployed in different locations. These subsystems interact with the physical world and execute specific monitoring and control functions. How to organize the sensors and actuators inside each subsystem and interconnect these physically separated subsystems together to achieve secure, reliable and real-time communication is a big cha
APA, Harvard, Vancouver, ISO, and other styles
25

Chatterjee, S., A. K. Kar, Y. K. Dwivedi, and Hatice Kizgin. "Prevention of cybercrimes in smart cities of India: from a citizen's perspective." 2019. http://hdl.handle.net/10454/17295.

Full text
Abstract:
Yes<br>Purpose: The purpose of this paper is to identify the factors influencing the citizens of India to prevent cybercrimes in the proposed Smart Cities of India. Design/methodology/approach: A conceptual model has been developed for identifying factors preventing cybercrimes. The conceptual model was validated empirically with a sample size of 315 participants from India. Data were analyzed using structural equation modeling with SPSS and AMOS softwares. Findings: The study reveals that the “awareness of cybercrimes” significantly influences the actual usage of technology to prevent c
APA, Harvard, Vancouver, ISO, and other styles
26

"Modeling, Analysis, and Efficient Resource Allocation in Cyber-Physical Systems and Critical Infrastructure Networks." Doctoral diss., 2016. http://hdl.handle.net/2286/R.I.40732.

Full text
Abstract:
abstract: The critical infrastructures of the nation are a large and complex network of human, physical and cyber-physical systems. In recent times, it has become increasingly apparent that individual critical infrastructures, such as the power and communication networks, do not operate in isolation, but instead are part of a complex interdependent ecosystem where a failure involving a small set of network entities can trigger a cascading event resulting in the failure of a much larger set of entities through the failure propagation process. Recognizing the need for a deeper understanding of
APA, Harvard, Vancouver, ISO, and other styles
27

安達, 淳. "最先端学術情報基盤 Cyber Science Infrastructure の構築に向けて". 2006. http://hdl.handle.net/2237/9603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Starý, Jan. "Potenciál kybernetických hrozeb v oblasti kritické energetické infrastruktury." Master's thesis, 2015. http://www.nusl.cz/ntk/nusl-333806.

Full text
Abstract:
Diploma thesis analyses the potential of Cyber Threats towards critical energy infrastructure in terms of network theories originating in graph theories, complex networks and technological possibilities how to compromise security of networks belonging to critical infrastructure. By the analysis of defined dependent and independent variables the author finds out how networks behave under which circumstances, what means exist in the field of network security and if adopted measures to increase security are in accordance with the effort of creation safe and decentralized system of critical energy
APA, Harvard, Vancouver, ISO, and other styles
29

Silva, Ricardo Alexandre Marques. "A cibersegurança na política externa e de segurança da Estónia." Master's thesis, 2020. http://hdl.handle.net/10362/111191.

Full text
Abstract:
This thesis is focused on the role of Estonia's Foreign Policy in the field of cybersecurity. The concepts of cyberspace and cybersecurity are explored, detailing the main challenges that take place there, in order to better understand the threats faced by the advanced estonian digital society. It deals with the work of the main forums in which Estonia takes part, whose decisions and/or positions have a potential internal impact. In NATO and the EU, especially, this country finds a stage for its voices, drawing attention on the Russian geopolitical movements, which they see as hostile. The e
APA, Harvard, Vancouver, ISO, and other styles
30

Rezek, Tomáš. "Vliv kybernetického terorismu na americkou bezpečnostní politiku." Doctoral thesis, 2015. http://www.nusl.cz/ntk/nusl-333797.

Full text
Abstract:
(English) The aim of this dissertation is to answer the question of whether the U.S. security policy is influenced by the threat of cyber terrorism. The dissertation is divided into chapters that can be regarded as steps in a logical reasoning process. In the first chapter, cyber space is introduced and described to illustrate its importance and complexity. The next chapter analytically compares various definitions of terrorism, and partially rejects the initial hypothesis that cyber terrorism is not included in the general definition of terrorism. The following chapter statistically analyzes
APA, Harvard, Vancouver, ISO, and other styles
31

Filípek, Tomáš. "Smart Infrastructure Visualization." Master's thesis, 2016. http://www.nusl.cz/ntk/nusl-352723.

Full text
Abstract:
Computational power of mobile devices has been continuously improving in the recent years. One of the benefits which it brings, is feasibility of new kinds of distributed systems, such as Ensemble-Based Component Systems (EBCS). For practical reasons, EBCS systems are usually tested using simulations before being released. However, it can be difficult to interpret the simulation output, as it is usually contained in XML format, which is more suited to be read by machines than by people. We provide a visualizing application, which creates a graphical representation of such a simulation output.
APA, Harvard, Vancouver, ISO, and other styles
32

Біланич, Іван Васильович, та Ivan Bilanych. "Огляд платформ, які використовуються в розумних містах". Bachelor's thesis, 2021. http://elartu.tntu.edu.ua/handle/lib/35782.

Full text
Abstract:
У роботі проведено загальне ознайомлення з історією розвитку розумного міста. Описані різні технології, які використовувались у розробці, пов’язаній з розумними містами. Ці технології можна використовувати на різних рівнях для забезпечення оптимального вирішення конкретних проблем. Нижче представлено платформи, які базуються на представлених технологіях. Другий розділ присвячений огляду інформаційно-технологічним платформ у розумних містах та інформаційних і комунікаційних технологій. Ці технології використовуються для групування аналізованих платформ і допомагають краще зрозуміти вимоги, на
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!