Academic literature on the topic 'Cyber security architecture'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber security architecture.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cyber security architecture"

1

Pöyhönen, Jouni, and Martti Lehto. "Architecture Framework for Cyber Security Management." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 388–97. http://dx.doi.org/10.34190/eccws.23.1.2340.

Full text
Abstract:
The smooth operation of contemporary society relies on the collaborative functioning of multiple essential infrastructures, with their collective effectiveness increasingly hinging on a dependable national system of systems construction. The central focus within the realm of cyberspace revolves around safeguarding this critical infrastructure (CI), which includes both physical and electronic components essential for societal operations. The recent surge in cyber-attacks targeting CI, critical information infrastructures, and the Internet, characterized by heightened frequency and increased sop
APA, Harvard, Vancouver, ISO, and other styles
2

Board, Editorial. "Well-known Personality in a Technical World and Information System." Global Journal of Enterprise Information System 8, no. 1 (2016): 62. http://dx.doi.org/10.18311/gjeis/2016/7294.

Full text
Abstract:
We are pleased to share profile of Col. Inderjit Singh (Retd). Inderjit is a an experienced Information Systems and Information Security Professional with experience of more than 25 year across a wide spectrum of areas spanning Solution Architecture, Program/Project Management Telecom, IT Infrastructure Management, Info Security Advisory and Architecture, Cyber Security, Cyber Warfare and Cyber Forensics, Data Centers Design and Operations, Cloud Computing and E-Commerce Startup. An experienced Information Systems Professional with experience of more than 25 year across a wide spectrum of area
APA, Harvard, Vancouver, ISO, and other styles
3

Jones, Rick A., and Barry Horowitz. "A System-Aware Cyber Security architecture." Systems Engineering 15, no. 2 (2012): 225–40. http://dx.doi.org/10.1002/sys.21206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kumari, Shreya, Ishant Jaiswal, Kamil Zeya, Anshu Singh, Dharmendra Kumar, and Suresh Tiwari. "Implementation of Cyber Security Architectures Based on Review Analysis." International Journal of Innovative Research in Information Security 10, no. 06 (2024): 660–67. https://doi.org/10.26562/ijiris.2024.v1006.01.

Full text
Abstract:
As we know that the cyber security is an evaluating field. So, there are lots of problems which was held while the using Social Media and Security related issues. Because of this, the company of a Organisation cannot secure own system, software, data, and many more from cyber crimes like threats, phishing, cyber bullying, and more. So, How we will safe from that type of threats ? Yes, It is possible, We made a Cyber Security Architectures which will performing in some steps to prevent from threats. During the Implementation of Architecture, we use some tools like Firewall, VPN’s and Intrusion
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Zhong Wei, Li Cheng, Hong Li Zhang, and Wei Ming Tong. "Communication and Cyber Security Analysis of Advanced Metering Infrastructure of Smart Grid." Applied Mechanics and Materials 325-326 (June 2013): 637–42. http://dx.doi.org/10.4028/www.scientific.net/amm.325-326.637.

Full text
Abstract:
AMI (Advanced Metering Infrastructure) is the first step of the implementation of the smart grid. The communication network is the important part of AMI. The reasonable communication network architecture and effective cyber security measures are the keys of the realization of AMIs functions. The components, functions and communication network architecture are studied. Communication technologies that can be used in AMI are analyzed. Based on ZigBee, fieldbus/industrial EtherNet and GPRS, a typical AMI are constructed. The cyber security threats, communication data types and cyber security requi
APA, Harvard, Vancouver, ISO, and other styles
6

J. C. Joshi, Mrs. "Cyber Security Awareness Game." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem44990.

Full text
Abstract:
This review paper explores the development of an Android-based Cyber Security Awareness Game aimed at educating users about digital threats through interactive gameplay. In a world where cyber-attacks are increasingly common, the application uses quizzes, Lottie animations, and a game-like interface to teach users about topics like phishing, malware, password safety, and data protection. The app is built using Android’s XML and Java architecture, and includes engaging UI elements to enhance the learning experience. Keywords: Cybersecurity, Android, Quiz Game, Awareness, Lottie Animation, UI De
APA, Harvard, Vancouver, ISO, and other styles
7

Nazir, Sajid, Shushma Patel, and Dilip Patel. "Autonomic Computing Architecture for SCADA Cyber Security." International Journal of Cognitive Informatics and Natural Intelligence 11, no. 4 (2017): 66–79. http://dx.doi.org/10.4018/ijcini.2017100104.

Full text
Abstract:
Autonomic computing paradigm is based on intelligent computing systems that can autonomously take actions under given conditions. These technologies have been successfully applied to many problem domains requiring autonomous operation. One such area of national interest is SCADA systems that monitor critical infrastructures such as transportation networks, large manufacturing, business and health facilities, power generation, and distribution networks. The SCADA systems have evolved into a complex, highly connected system requiring high availability. On the other hand, cyber threats to these i
APA, Harvard, Vancouver, ISO, and other styles
8

Justice, Connie, and Char Sample. "Future Needs of the Cybersecurity Workforce." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 81–91. http://dx.doi.org/10.34190/iccws.17.1.33.

Full text
Abstract:
Expected growth of the job market for cyber security professionals in both the US and the UK remains strong for the foreseeable future. While there are many roles to be found in cyber security, that vary from penetration tester to chief information security officer (CISO). One job of particular interest is security architect. The rise in Zero Trust Architecture (ZTA) implementations, especially in the cloud environment, promises an increase in the demand for these security professionals. A security architect requires a set of knowledge, skills, and abilities covering the responsibility for int
APA, Harvard, Vancouver, ISO, and other styles
9

Sándor, Barnabás, and Zoltán Rajnai. "Cyber Security Analysis of Smart Buildings from a Cyber Security Architecture Point of View." Interdisciplinary Description of Complex Systems 21, no. 2 (2023): 141–47. http://dx.doi.org/10.7906/indecs.21.2.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Yangrong, June Li, Qiuyu Lu, Hai Lin, Yu Xia, and Fuyang Li. "Cyber Security for Multi-Station Integrated Smart Energy Stations: Architecture and Solutions." Energies 14, no. 14 (2021): 4287. http://dx.doi.org/10.3390/en14144287.

Full text
Abstract:
Multi-station integration is motivated by the requirements of distributed energies interconnection and improvements in the efficiency of energy systems. Due to the diversity of communication services and the complexity of data exchanges between in-of-station and out-of-station, multi-station integrated systems have high security requirements. However, issues related to cyber security for multi-station integrated systems are seldom explored. Hence, this paper designs the secondary system architecture and proposes cyber security protection solutions for smart energy stations (SESt) that integrat
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cyber security architecture"

1

Chivukula, Venkata Ramakrishna. "Detecting Cyber Security Anti-Patterns in System Architecture Models." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-293027.

Full text
Abstract:
Organizations across the world have been on the receiving end of large-scale cyber-attacks. Over time, the number and the success of these attacks have grown to a high level. To prepare for these attacks, organizations have to test the resilience of their infrastructures. One way to manage the risk of these attacks and to ensure security is the use of threat modeling. Through threat modeling, organizations can analyze their infrastructure and identify vulnerabilities. The vulnerabilities then have to be patched to improve the overall security posture of the organization. When modeled, these vu
APA, Harvard, Vancouver, ISO, and other styles
2

Sommestad, Teodor. "A framework and theory for cyber security assessments." Doctoral thesis, KTH, Industriella informations- och styrsystem, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-103690.

Full text
Abstract:
Information technology (IT) is critical and valuable to our society. An important type of IT system is Supervisor Control And Data Acquisition (SCADA) systems. These systems are used to control and monitor physical industrial processes like electrical power supply, water supply and railroad transport. Since our society is heavily dependent on these industrial processes we are also dependent on the behavior of our SCADA systems. SCADA systems have become (and continue to be) integrated with other IT systems they are thereby becoming increasingly vulnerable to cyber threats. Decision makers need
APA, Harvard, Vancouver, ISO, and other styles
3

Blom, Rikard. "Advanced metering infrastructure reference model with automated cyber security analysis." Thesis, KTH, Elkraftteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-204910.

Full text
Abstract:
European Union has set a target to install nearly 200 million smart metersspread over Europe before 2020, this leads into a vast increase of sensitiveinformation flow for Distribution System Operators (DSO’s), simultaneously thisleads to raised cyber security threats. The in and outgoing information of the DSOneeds to be processed and stored by different Information technology (IT)- andOperational Technology (OT)-systems depending on the information. High demandsare therefore required of the enterprise cyber security to be able to protect theenterprise IT- and OT-systems. Sensitive customer in
APA, Harvard, Vancouver, ISO, and other styles
4

Youssef, Tarek. "Co-design of Security Aware Power System Distribution Architecture as Cyber Physical System." FIU Digital Commons, 2017. http://digitalcommons.fiu.edu/etd/3210.

Full text
Abstract:
The modern smart grid would involve deep integration between measurement nodes, communication systems, artificial intelligence, power electronics and distributed resources. On one hand, this type of integration can dramatically improve the grid performance and efficiency, but on the other, it can also introduce new types of vulnerabilities to the grid. To obtain the best performance, while minimizing the risk of vulnerabilities, the physical power system must be designed as a security aware system. In this dissertation, an interoperability and communication framework for microgrid control and
APA, Harvard, Vancouver, ISO, and other styles
5

Holm, Hannes. "A Framework and Calculation Engine for Modeling and Predicting the Cyber Security of Enterprise Architectures." Doctoral thesis, KTH, Industriella informations- och styrsystem, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-140525.

Full text
Abstract:
Information Technology (IT) is a cornerstone of our modern society and essential for governments' management of public services, economic growth and national security. Consequently, it is of importance that IT systems are kept in a dependable and secure state. Unfortunately, as modern IT systems typically are composed of numerous interconnected components, including personnel and processes that use or support it (often referred to as an enterprise architecture), this is not a simple endeavor. To make matters worse, there are malicious actors who seek to exploit vulnerabilities in the enterpris
APA, Harvard, Vancouver, ISO, and other styles
6

Wyman, Matthew Cody. "The SAP Link: A Controller Architecture for Secure Industrial Control Systems." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/8815.

Full text
Abstract:
Industrial Control Systems are essential to modern life. They are utilized in hundreds of processes including power distribution, water treatment, manufacturing, traffic management, and amusement park ride control. These systems are an essential part of modern life and if compromised, could result in significant economic loss, safety impacts, damage to the environment, and even loss of life. Unfortunately, many of these systems are not properly secured from a cyber attack. It is likely that a well-funded and motivated attack from a nation-state will successfully compromise an industrial contro
APA, Harvard, Vancouver, ISO, and other styles
7

Khatwani, Chanchal. "Security Analysis of ECC Based Protocols." UNF Digital Commons, 2017. http://digitalcommons.unf.edu/etd/734.

Full text
Abstract:
Elliptic curve cryptography (ECC) is extensively used in various multifactor authentication protocols. In this work, various recent ECC based authentication and key exchange protocols are subjected to threat modeling and static analysis to detect vulnerabilities, and to enhance them to be more secure against threats. This work demonstrates how currently used ECC based protocols are vulnerable to attacks. If protocols are vulnerable, damages could include critical data loss and elevated privacy concerns. The protocols considered in thiswork differ in their usage of security factors (e.g. passwo
APA, Harvard, Vancouver, ISO, and other styles
8

Tamrakar, Anjila. "SPICE: A Software Tool for Studying End-user’s Insecure Cyber Behavior and Personality-traits." ScholarWorks@UNO, 2016. http://scholarworks.uno.edu/td/2236.

Full text
Abstract:
Insecure cyber behavior of end users may expose their computers to cyber-attack. A first step to improve their cyber behavior is to identify their tendency toward insecure cyber behavior. Unfortunately, not much work has been done in this area. In particular, the relationship between end users cyber behavior and their personality traits is much less explored. This paper presents a comprehensive review of a newly developed, easily configurable, and flexible software SPICE for psychologist and cognitive scientists to study personality traits and insecure cyber behavior of end users. The software
APA, Harvard, Vancouver, ISO, and other styles
9

Zerkane, Salaheddine. "Security Analysis and Access Control Enforcement through Software Defined Networks." Thesis, Brest, 2018. http://www.theses.fr/2018BRES0057/document.

Full text
Abstract:
Les réseaux programmables (SDN) sont un paradigme émergent qui promet de résoudre les limitations de l'architecture du réseau conventionnel. Dans cette thèse, nous étudions et explorons deux aspects de la relation entre la cybersécurité et les réseaux programmables. D'une part, nous étudions la sécurité pour les réseaux programmables en effectuant une analyse de leurs vulnérabilités. Une telle analyse de sécurité est un processus crucial pour identifier les failles de sécurité des réseaux programmables et pour mesurer leurs impacts. D'autre part, nous explorons l'apport des réseaux programmabl
APA, Harvard, Vancouver, ISO, and other styles
10

Cameron, Calum Duncan. "Self-organising smart grid architectures for cyber-security." Thesis, University of Newcastle upon Tyne, 2017. http://hdl.handle.net/10443/3799.

Full text
Abstract:
Current conventional power systems consist of large-scale centralised generation and unidirectional power flow from generation to demand. This vision for power system design is being challenged by the need to satisfy the energy trilemma, as the system is required to be sustainable, available and secure. Emerging technologies are restructuring the power system; the addition of distributed generation, energy storage and active participation of customers are changing the roles and requirements of the distribution network. Increased controllability and monitoring requirements combined with an incr
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Cyber security architecture"

1

Guo, Song, and Deze Zeng, eds. Cyber-Physical Systems: Architecture, Security and Application. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-92564-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Handa, Anand, Rohit Negi, S. Venkatesan, and Sandeep K. Shukla. Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II. River Publishers, 2023. http://dx.doi.org/10.1201/9781003426134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cavallaro, Lorenzo. Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems: 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings. Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gladyshev, Pavel. Digital Forensics and Cyber Crime: Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Insider's Guide to Cyber Security Architecture. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cyber Security : ESORMA Quickstart Guide: Enterprise Security Operations Risk Management Architecture for Cyber Security Practitioners. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Guo, Song, and Deze Zeng. Cyber-Physical Systems: Architecture, Security and Application. Springer, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Guo, Song, and Deze Zeng. Cyber-Physical Systems: Architecture, Security and Application. Springer, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cyber Security : ESORMA Quick Start Guide: Enterprise Security Operations Risk Management Architecture for Cyber Security Practitioners. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ahmed, Mustafa, and David White. Cyber Security : ESORMA Quickstart Guide Workbook: Enterprise Security Operations Risk Management Architecture for Cyber Security Practitioners. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cyber security architecture"

1

Fiedelholtz. "Cloud Architecture." In The Cyber Security Network Guide. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61591-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tawalbeh, Lo’ai. "System Architecture." In The NICE Cyber Security Framework. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41987-5_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Crowder, James A., John N. Carbone, and Shelli A. Friess. "Cyber Security Within a Cognitive Architecture." In Artificial Cognition Architectures. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-8072-3_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

du Toit, Jaco. "PAUDIT: A Distributed Data Architecture for Fitness Data." In Information and Cyber Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43276-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Langer, Arthur, and Arka Mukherjee. "Blockchain Data Architecture and Cyber Security." In Developing a Path to Data Dominance. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-26401-6_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Smidts, Carol, Xiaoxu Diao, and Pavan Kumar Vaddi. "Next-Generation Architecture and Autonomous Cyber-Defense." In Advances in Information Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-18214-4_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ullah, Faheem, and Muhammad Ali Babar. "Guidance Models for Designing Big Data Cyber Security Analytics Systems." In Software Architecture. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-42592-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bakshi, Gaytri. "IoT Architecture Vulnerabilities and Security Measures." In Security Incidents & Response Against Cyber Attacks. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69174-5_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mohan, Apurva, Gregory Brainard, Himanshu Khurana, and Scott Fischer. "A Cyber Security Architecture for Microgrid Deployments." In IFIP Advances in Information and Communication Technology. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26567-4_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

De Zan, Tommaso, Giampiero Giacomello, and Luigi Martino. "Italy’s cyber security architecture and critical infrastructure." In Routledge Companion to Global Cyber-Security Strategy. Routledge, 2020. http://dx.doi.org/10.4324/9780429399718-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cyber security architecture"

1

Chokkanathan, K., S. M. Karpagavalli, G. Priyanka, K. Vanitha, K. Anitha, and P. Shenbagavalli. "AI-Driven Zero Trust Architecture: Enhancing Cyber-Security Resilience." In 2024 8th International Conference on Computational System and Information Technology for Sustainable Solutions (CSITSS). IEEE, 2024. https://doi.org/10.1109/csitss64042.2024.10816746.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhao, Hongwei, Vianney Lapôtre, and Guy Gogniat. "Communication Architecture Under Siege: An In-depth Analysis of Fault Attack Vulnerabilities and Countermeasures." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679464.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Saleem, Muhammad Asif, Norhalina Senan, and Muhammad Aamir. "Optimized CNN Architecture based on Mutant Particle Swarm Optimization and Opposition Based Learning for Image Classification." In 2024 1st International Conference on Cyber Security and Computing (CyberComp). IEEE, 2024. https://doi.org/10.1109/cybercomp60759.2024.10913686.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hasan, Saqib, Isaac Amundson, and David Hardin. "Zero Trust Architecture Patterns for Cyber-Physical Systems." In 2023 AeroTech. SAE International, 2023. http://dx.doi.org/10.4271/2023-01-1001.

Full text
Abstract:
<div class="section abstract"><div class="htmlview paragraph">Zero trust (ZT) is an emerging initiative that focuses on securely providing access to resources based on defined policies. The core tenet of ZT is “never trust, always verify”, meaning that even within trusted zones of operation, resource access must be explicitly granted. ZT has proven effective in improving the security posture in domains such as information technology infrastructure; however, additional research and development is needed to define and apply zero trust principles to cyber-physical system domains. To w
APA, Harvard, Vancouver, ISO, and other styles
5

Payne, Charles, Hazel Shackleton, August Schwerdfeger, John Shackleton, Bruce Lewis, and Alex Boydston. "Using AADL to Assess Architectural Concerns for Cyber Security." In 2023 AeroTech. SAE International, 2023. http://dx.doi.org/10.4271/2023-01-0998.

Full text
Abstract:
<div class="section abstract"><div class="htmlview paragraph">We describe how we apply the SAE AS 5506 Architecture and Analysis Design Language (AADL) [<span class="xref">4</span>] to reason about contextual and architectural concerns for cyber security. A system’s cyber security certification requires verification that the system’s cyber security mechanisms are correct, non-bypassable, and tamper-resistant. We can verify correctness by examining the mechanism itself, but verifying the other qualities requires us to examine the context in which that mechanism resides.
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Gang, Xiaofeng Qiu, and Wei Chang. "Scheduling of Security Resources in Software Defined Security Architecture." In 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2017. http://dx.doi.org/10.1109/cyberc.2017.46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hamilton, John A. "Architecture-based network simulation for cyber security." In 2013 Winter Simulation Conference - (WSC 2013). IEEE, 2013. http://dx.doi.org/10.1109/wsc.2013.6721660.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ekstedt, Mathias, and Teodor Sommestad. "Enterprise architecture models for cyber security analysis." In 2009 IEEE/PES Power Systems Conference and Exposition (PSCE). IEEE, 2009. http://dx.doi.org/10.1109/psce.2009.4840267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Choi, Sung, Adrian Chavez, Marcos Torres, Cheolhyeon Kwon, and Inseok Hwang. "Trustworthy design architecture: Cyber-physical system." In 2017 International Carnahan Conference on Security Technology (ICCST). IEEE, 2017. http://dx.doi.org/10.1109/ccst.2017.8167827.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lang, Weimin, Yuancheng Zhu, and Husheng Li. "Security architecture for energy-efficient Wireless Cognitive Sensor Network." In 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2012. http://dx.doi.org/10.1109/cyber.2012.6319876.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cyber security architecture"

1

Veitch, Cynthia, Jordan Henry, Bryan Richardson, and Derek Hart. Microgrid cyber security reference architecture. Office of Scientific and Technical Information (OSTI), 2013. http://dx.doi.org/10.2172/1090210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Stamp, Jason E., Cynthia K. Veitch, Jordan M. Henry, Derek H. Hart, and Bryan Richardson. Microgrid Cyber Security Reference Architecture (V2). Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1494354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!