Academic literature on the topic 'Cyber security architecture'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber security architecture.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cyber security architecture"
Pöyhönen, Jouni, and Martti Lehto. "Architecture Framework for Cyber Security Management." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 388–97. http://dx.doi.org/10.34190/eccws.23.1.2340.
Full textBoard, Editorial. "Well-known Personality in a Technical World and Information System." Global Journal of Enterprise Information System 8, no. 1 (2016): 62. http://dx.doi.org/10.18311/gjeis/2016/7294.
Full textJones, Rick A., and Barry Horowitz. "A System-Aware Cyber Security architecture." Systems Engineering 15, no. 2 (2012): 225–40. http://dx.doi.org/10.1002/sys.21206.
Full textKumari, Shreya, Ishant Jaiswal, Kamil Zeya, Anshu Singh, Dharmendra Kumar, and Suresh Tiwari. "Implementation of Cyber Security Architectures Based on Review Analysis." International Journal of Innovative Research in Information Security 10, no. 06 (2024): 660–67. https://doi.org/10.26562/ijiris.2024.v1006.01.
Full textLi, Zhong Wei, Li Cheng, Hong Li Zhang, and Wei Ming Tong. "Communication and Cyber Security Analysis of Advanced Metering Infrastructure of Smart Grid." Applied Mechanics and Materials 325-326 (June 2013): 637–42. http://dx.doi.org/10.4028/www.scientific.net/amm.325-326.637.
Full textJ. C. Joshi, Mrs. "Cyber Security Awareness Game." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem44990.
Full textNazir, Sajid, Shushma Patel, and Dilip Patel. "Autonomic Computing Architecture for SCADA Cyber Security." International Journal of Cognitive Informatics and Natural Intelligence 11, no. 4 (2017): 66–79. http://dx.doi.org/10.4018/ijcini.2017100104.
Full textJustice, Connie, and Char Sample. "Future Needs of the Cybersecurity Workforce." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 81–91. http://dx.doi.org/10.34190/iccws.17.1.33.
Full textSándor, Barnabás, and Zoltán Rajnai. "Cyber Security Analysis of Smart Buildings from a Cyber Security Architecture Point of View." Interdisciplinary Description of Complex Systems 21, no. 2 (2023): 141–47. http://dx.doi.org/10.7906/indecs.21.2.2.
Full textChen, Yangrong, June Li, Qiuyu Lu, Hai Lin, Yu Xia, and Fuyang Li. "Cyber Security for Multi-Station Integrated Smart Energy Stations: Architecture and Solutions." Energies 14, no. 14 (2021): 4287. http://dx.doi.org/10.3390/en14144287.
Full textDissertations / Theses on the topic "Cyber security architecture"
Chivukula, Venkata Ramakrishna. "Detecting Cyber Security Anti-Patterns in System Architecture Models." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-293027.
Full textSommestad, Teodor. "A framework and theory for cyber security assessments." Doctoral thesis, KTH, Industriella informations- och styrsystem, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-103690.
Full textBlom, Rikard. "Advanced metering infrastructure reference model with automated cyber security analysis." Thesis, KTH, Elkraftteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-204910.
Full textYoussef, Tarek. "Co-design of Security Aware Power System Distribution Architecture as Cyber Physical System." FIU Digital Commons, 2017. http://digitalcommons.fiu.edu/etd/3210.
Full textHolm, Hannes. "A Framework and Calculation Engine for Modeling and Predicting the Cyber Security of Enterprise Architectures." Doctoral thesis, KTH, Industriella informations- och styrsystem, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-140525.
Full textWyman, Matthew Cody. "The SAP Link: A Controller Architecture for Secure Industrial Control Systems." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/8815.
Full textKhatwani, Chanchal. "Security Analysis of ECC Based Protocols." UNF Digital Commons, 2017. http://digitalcommons.unf.edu/etd/734.
Full textTamrakar, Anjila. "SPICE: A Software Tool for Studying End-user’s Insecure Cyber Behavior and Personality-traits." ScholarWorks@UNO, 2016. http://scholarworks.uno.edu/td/2236.
Full textZerkane, Salaheddine. "Security Analysis and Access Control Enforcement through Software Defined Networks." Thesis, Brest, 2018. http://www.theses.fr/2018BRES0057/document.
Full textCameron, Calum Duncan. "Self-organising smart grid architectures for cyber-security." Thesis, University of Newcastle upon Tyne, 2017. http://hdl.handle.net/10443/3799.
Full textBooks on the topic "Cyber security architecture"
Guo, Song, and Deze Zeng, eds. Cyber-Physical Systems: Architecture, Security and Application. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-92564-6.
Full textHanda, Anand, Rohit Negi, S. Venkatesan, and Sandeep K. Shukla. Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II. River Publishers, 2023. http://dx.doi.org/10.1201/9781003426134.
Full textCavallaro, Lorenzo. Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems: 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings. Springer Berlin Heidelberg, 2013.
Find full textGladyshev, Pavel. Digital Forensics and Cyber Crime: Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textCyber Security : ESORMA Quickstart Guide: Enterprise Security Operations Risk Management Architecture for Cyber Security Practitioners. Independently Published, 2020.
Find full textGuo, Song, and Deze Zeng. Cyber-Physical Systems: Architecture, Security and Application. Springer, 2018.
Find full textGuo, Song, and Deze Zeng. Cyber-Physical Systems: Architecture, Security and Application. Springer, 2019.
Find full textCyber Security : ESORMA Quick Start Guide: Enterprise Security Operations Risk Management Architecture for Cyber Security Practitioners. Independently Published, 2020.
Find full textAhmed, Mustafa, and David White. Cyber Security : ESORMA Quickstart Guide Workbook: Enterprise Security Operations Risk Management Architecture for Cyber Security Practitioners. Independently Published, 2020.
Find full textBook chapters on the topic "Cyber security architecture"
Fiedelholtz. "Cloud Architecture." In The Cyber Security Network Guide. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61591-8_5.
Full textTawalbeh, Lo’ai. "System Architecture." In The NICE Cyber Security Framework. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41987-5_9.
Full textCrowder, James A., John N. Carbone, and Shelli A. Friess. "Cyber Security Within a Cognitive Architecture." In Artificial Cognition Architectures. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-8072-3_12.
Full textdu Toit, Jaco. "PAUDIT: A Distributed Data Architecture for Fitness Data." In Information and Cyber Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43276-8_4.
Full textLanger, Arthur, and Arka Mukherjee. "Blockchain Data Architecture and Cyber Security." In Developing a Path to Data Dominance. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-26401-6_10.
Full textSmidts, Carol, Xiaoxu Diao, and Pavan Kumar Vaddi. "Next-Generation Architecture and Autonomous Cyber-Defense." In Advances in Information Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-18214-4_10.
Full textUllah, Faheem, and Muhammad Ali Babar. "Guidance Models for Designing Big Data Cyber Security Analytics Systems." In Software Architecture. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-42592-9_5.
Full textBakshi, Gaytri. "IoT Architecture Vulnerabilities and Security Measures." In Security Incidents & Response Against Cyber Attacks. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69174-5_10.
Full textMohan, Apurva, Gregory Brainard, Himanshu Khurana, and Scott Fischer. "A Cyber Security Architecture for Microgrid Deployments." In IFIP Advances in Information and Communication Technology. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26567-4_15.
Full textDe Zan, Tommaso, Giampiero Giacomello, and Luigi Martino. "Italy’s cyber security architecture and critical infrastructure." In Routledge Companion to Global Cyber-Security Strategy. Routledge, 2020. http://dx.doi.org/10.4324/9780429399718-10.
Full textConference papers on the topic "Cyber security architecture"
Chokkanathan, K., S. M. Karpagavalli, G. Priyanka, K. Vanitha, K. Anitha, and P. Shenbagavalli. "AI-Driven Zero Trust Architecture: Enhancing Cyber-Security Resilience." In 2024 8th International Conference on Computational System and Information Technology for Sustainable Solutions (CSITSS). IEEE, 2024. https://doi.org/10.1109/csitss64042.2024.10816746.
Full textZhao, Hongwei, Vianney Lapôtre, and Guy Gogniat. "Communication Architecture Under Siege: An In-depth Analysis of Fault Attack Vulnerabilities and Countermeasures." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679464.
Full textSaleem, Muhammad Asif, Norhalina Senan, and Muhammad Aamir. "Optimized CNN Architecture based on Mutant Particle Swarm Optimization and Opposition Based Learning for Image Classification." In 2024 1st International Conference on Cyber Security and Computing (CyberComp). IEEE, 2024. https://doi.org/10.1109/cybercomp60759.2024.10913686.
Full textHasan, Saqib, Isaac Amundson, and David Hardin. "Zero Trust Architecture Patterns for Cyber-Physical Systems." In 2023 AeroTech. SAE International, 2023. http://dx.doi.org/10.4271/2023-01-1001.
Full textPayne, Charles, Hazel Shackleton, August Schwerdfeger, John Shackleton, Bruce Lewis, and Alex Boydston. "Using AADL to Assess Architectural Concerns for Cyber Security." In 2023 AeroTech. SAE International, 2023. http://dx.doi.org/10.4271/2023-01-0998.
Full textZhang, Gang, Xiaofeng Qiu, and Wei Chang. "Scheduling of Security Resources in Software Defined Security Architecture." In 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2017. http://dx.doi.org/10.1109/cyberc.2017.46.
Full textHamilton, John A. "Architecture-based network simulation for cyber security." In 2013 Winter Simulation Conference - (WSC 2013). IEEE, 2013. http://dx.doi.org/10.1109/wsc.2013.6721660.
Full textEkstedt, Mathias, and Teodor Sommestad. "Enterprise architecture models for cyber security analysis." In 2009 IEEE/PES Power Systems Conference and Exposition (PSCE). IEEE, 2009. http://dx.doi.org/10.1109/psce.2009.4840267.
Full textChoi, Sung, Adrian Chavez, Marcos Torres, Cheolhyeon Kwon, and Inseok Hwang. "Trustworthy design architecture: Cyber-physical system." In 2017 International Carnahan Conference on Security Technology (ICCST). IEEE, 2017. http://dx.doi.org/10.1109/ccst.2017.8167827.
Full textLang, Weimin, Yuancheng Zhu, and Husheng Li. "Security architecture for energy-efficient Wireless Cognitive Sensor Network." In 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2012. http://dx.doi.org/10.1109/cyber.2012.6319876.
Full textReports on the topic "Cyber security architecture"
Veitch, Cynthia, Jordan Henry, Bryan Richardson, and Derek Hart. Microgrid cyber security reference architecture. Office of Scientific and Technical Information (OSTI), 2013. http://dx.doi.org/10.2172/1090210.
Full textStamp, Jason E., Cynthia K. Veitch, Jordan M. Henry, Derek H. Hart, and Bryan Richardson. Microgrid Cyber Security Reference Architecture (V2). Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1494354.
Full text