Academic literature on the topic 'Industrial cybersecurity'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Industrial cybersecurity.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Industrial cybersecurity"
Shikhaliyev, Ramiz. "CYBERSECURITY ANALYSIS OF INDUSTRIAL CONTROL SYSTEMS." Problems of Information Society 14, no. 2 (2023): 47–54. http://dx.doi.org/10.25045/jpis.v14.i2.06.
Full textKind, Andreas. "The Power of Industrial Cybersecurity." Digitale Welt 5, no. 1 (2020): 18–21. http://dx.doi.org/10.1007/s42354-020-0316-2.
Full textPOCHMARA, Janusz. "Industrial cybersecurity and machine learning." PRZEGLĄD ELEKTROTECHNICZNY 1, no. 4 (2025): 86–90. https://doi.org/10.15199/48.2025.04.16.
Full textMerzlikin, Eugene, and Ievgen Babeshko. "CYBERSECURITY ANALYSIS OF WEB-ORIENTED INDUSTRIAL IOT-SYSTEMS." Innovative Technologies and Scientific Solutions for Industries, no. 2 (24) (August 5, 2023): 131–44. http://dx.doi.org/10.30837/itssi.2023.24.131.
Full textShikhaliyev, Ramiz H. "CYBERSECURITY RISKS MANAGEMENT OF INDUSTRIAL CONTROL SYSTEMS: A REVIEW." Problems of Information Technology 15, no. 1 (2024): 37–43. http://dx.doi.org/10.25045/jpit.v15.i1.05.
Full textTimmers, Paul. "The European Union’s cybersecurity industrial policy." Journal of Cyber Policy 3, no. 3 (2018): 363–84. http://dx.doi.org/10.1080/23738871.2018.1562560.
Full textGoebel, Kai, and Shantanu Rane. "AI in Industrial IoT Cybersecurity [Industrial and Governmental Activities]." IEEE Computational Intelligence Magazine 19, no. 1 (2024): 14–15. http://dx.doi.org/10.1109/mci.2023.3332547.
Full textDorage, Sachin Vasant. "Cybersecurity in Industrial Management within the Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–16. http://dx.doi.org/10.55041/ijsrem37081.
Full textCarpenter, Chris. "Industrial Cybersecurity, Process Safety, and Human Factors: A 360° Approach." Journal of Petroleum Technology 76, no. 08 (2024): 79–82. http://dx.doi.org/10.2118/0824-0079-jpt.
Full textMorozova, Olga, Andrii Nicheporuk, Artem Tetskyi, and Vitalii Tkachov. "Methods and technologies for ensuring cybersecurity of industrial and web-oriented systems and networks." RADIOELECTRONIC AND COMPUTER SYSTEMS, no. 4 (November 29, 2021): 145–56. http://dx.doi.org/10.32620/reks.2021.4.12.
Full textDissertations / Theses on the topic "Industrial cybersecurity"
Stewart, Alexander. "The Community Defense Approach: A Human Approach to Cybersecurity for Industrial and Manufacturing Systems." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1562059795078067.
Full textGAGGERO, GIOVANNI BATTISTA. "Machine Learning based Anomaly Detection for Cybersecurity Monitoring of Critical Infrastructures." Doctoral thesis, Università degli studi di Genova, 2022. http://hdl.handle.net/11567/1068918.
Full textMantere, M. (Matti). "Network security monitoring and anomaly detection in industrial control system networks." Doctoral thesis, Oulun yliopisto, 2015. http://urn.fi/urn:isbn:9789526208152.
Full textKoucham, Oualid. "Détection d'intrusions pour les systèmes de contrôle industriels." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAT090/document.
Full textDell'Elce, Martina. "Industria 4.0 ed Internet of Things, nuove sfide per la cybersecurity." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Find full textKabore, Raogo. "Hybrid deep neural network anomaly detection system for SCADA networks." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0190.
Full textSicard, Franck. "Prise en compte des risques de cyber-attaques dans le domaine de la sécurité des systèmes cyber-physiques : proposition de mécanismes de détection à base de modèles comportementaux." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAT080/document.
Full textJo, Arrah-Marie. "Economics of information security and the market for software vulnerabilities." Electronic Thesis or Diss., Institut polytechnique de Paris, 2019. http://www.theses.fr/2019IPPAT003.
Full textSeng, Sorithy. "Sonde de détection d'intrusion réseau avec suivi d'état de protocole et détection d'anomalie, de la modélisation à la combinaison entre des méthodes de spécification et de fouille de données (data mining)." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAS023.
Full textSenate, University of Arizona Faculty. "Faculty Senate Minutes February 6, 2017." University of Arizona Faculty Senate (Tucson, AZ), 2017. http://hdl.handle.net/10150/622775.
Full textBooks on the topic "Industrial cybersecurity"
Roth, Marc S. Information technology law institute 2013: Privacy and cybersecurity, mobile advertising, digital distribution, social media and the third industrial revolution. Practising Law Institute, 2013.
Find full textFlaus, Jean-Marie. Cybersecurity of Industrial Systems. Wiley & Sons, Incorporated, John, 2019.
Find full textFlaus, Jean-Marie. Cybersecurity of Industrial Systems. Wiley & Sons, Incorporated, John, 2019.
Find full textFlaus, Jean-Marie. Cybersecurity of Industrial Systems. Wiley & Sons, Incorporated, John, 2019.
Find full textFlaus, Jean-Marie. Cybersecurity of Industrial Systems. Wiley & Sons, Incorporated, John, 2019.
Find full textMacaulay, Tyson, and Bryan L. Singer. Cybersecurity for Industrial Control Systems. Auerbach Publications, 2016. http://dx.doi.org/10.1201/b11352.
Full textIndustrial Cybersecurity: Efficiently Monitor the Cybersecurity Posture of Your ICS Environment. Packt Publishing, Limited, 2021.
Find full textIndustrial Cybersecurity: Efficiently Monitor the Cybersecurity Posture of Your ICS Environment. de Gruyter GmbH, Walter, 2021.
Find full textIndustrial Cybersecurity: Efficiently Secure Critical Infrastructure Systems. de Gruyter GmbH, Walter, 2017.
Find full textAzizi, Neda, and Shahzaib Tahir. Strengthening Industrial Cybersecurity to Protect Business Intelligence. IGI Global, 2024.
Find full textBook chapters on the topic "Industrial cybersecurity"
Austin, Greg. "Chinese Views of the Cyber Industrial Complex." In Cybersecurity in China. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-68436-9_3.
Full textBuja, Atdhe. "Cybersecurity Risk Assessment Methods." In Cybersecurity of Industrial Internet of Things (IIoT). CRC Press, 2025. https://doi.org/10.1201/9781003383253-9.
Full textMöller, Dietmar P. F. "Cybersecurity in Cyber-Physical Systems." In Cyber-Physical Systems for Industrial Transformation. CRC Press, 2023. http://dx.doi.org/10.1201/9781003262527-5.
Full textBuja, Atdhe. "Effective Cybersecurity Countermeasures for Industrial IoT." In Cybersecurity of Industrial Internet of Things (IIoT). CRC Press, 2025. https://doi.org/10.1201/9781003383253-8.
Full textFowler, Bradley, and Bruce G. Chaundy. "Psychology of Industrial Organizational Cybersecurity Leadership." In Cybersecurity Leadership for Healthcare Organizations and Institutions of Higher Education. River Publishers, 2025. https://doi.org/10.1201/9788770047760-7.
Full textBuja, Atdhe. "Introduction to Industrial Infrastructure." In Cybersecurity of Industrial Internet of Things (IIoT). CRC Press, 2025. https://doi.org/10.1201/9781003383253-1.
Full textIonescu, Octavian, Viorel Dumitru, Emil Pricop, and Stefan Pircalabu. "Innovative Hardware-Based Cybersecurity Solutions." In Recent Developments on Industrial Control Systems Resilience. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31328-9_12.
Full textJanicke, Helge, Richard Smith, Leandros Maglaras, Allan Cook, Ying He, and Fenia Ferra. "Agile Incident Response in Industrial Control Environments." In Cybersecurity Issues in Emerging Technologies. CRC Press, 2021. http://dx.doi.org/10.1201/9781003109952-3.
Full textRehan, Syed. "Industrial IoT with AWS IoT." In AWS IoT With Edge ML and Cybersecurity. Apress, 2023. http://dx.doi.org/10.1007/979-8-8688-0011-5_7.
Full textBuja, Atdhe. "Implementation of the IIoT Cybersecurity Countermeasures." In Cybersecurity of Industrial Internet of Things (IIoT). CRC Press, 2025. https://doi.org/10.1201/9781003383253-10.
Full textConference papers on the topic "Industrial cybersecurity"
Chaiyasoonthorn, Sawatsakorn, Somsak Mitatha, Surapong Siripongdee, Montri Wiboonrat, and Theeraporn Sriudomsilp. "Cybersecurity for Industrial Control Systems." In 2024 9th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM). IEEE, 2024. http://dx.doi.org/10.1109/seeda-cecnsm63478.2024.00013.
Full textLaan, Nathan, Rahul Gupta, Alexander W. Koehler, and Wesley Van Hill. "Implementing Cybersecurity for Industrial-Connected Products." In 2024 IEEE IAS Petroleum and Chemical Industry Technical Conference (PCIC). IEEE, 2024. https://doi.org/10.1109/pcic47799.2024.10832232.
Full textKabulov, I., C. Karthikeyan, Prashant Chourasiya, Sandeep Singh, Myasar Mundher Adnan, and Arti Badhoutiya. "Contemporary Cybersecurity Framework for Industrial Cloud Deployment." In 2024 International Conference on Communication, Computing and Energy Efficient Technologies (I3CEET). IEEE, 2024. https://doi.org/10.1109/i3ceet61722.2024.10993635.
Full textSoudan, Bassel. "Cybersecurity of Digital Twins in Industrial IoT Environments." In 2024 Advances in Science and Engineering Technology International Conferences (ASET). IEEE, 2024. http://dx.doi.org/10.1109/aset60340.2024.10708640.
Full textKorn, Brian, Doug Suerich, Andrew Seward, and Mayura Padmanabhan. "An Industry Plan for Cybersecurity : IE: Industrial Engineering." In 2025 36th Annual SEMI Advanced Semiconductor Manufacturing Conference (ASMC). IEEE, 2025. https://doi.org/10.1109/asmc64512.2025.11010241.
Full textZhang, Cynthia, Ranjan Pal, Corwin Nicholson, and Michael Siegel. "(Gen)AI Versus (Gen)AI in Industrial Control Cybersecurity." In 2024 Winter Simulation Conference (WSC). IEEE, 2024. https://doi.org/10.1109/wsc63780.2024.10838831.
Full textIosif, Andrei-Cristian, Ulrike Lechner, Maria Pinto-Albuquerque, and Tiago Espinha Gasiba. "Serious Game for Industrial Cybersecurity: Experiential Learning Through Code Review." In 2024 36th International Conference on Software Engineering Education and Training (CSEE&T). IEEE, 2024. http://dx.doi.org/10.1109/cseet62301.2024.10663058.
Full textPatel, Hiren, Asma Jodeiri Akbarfam, and Hoda Maleki. "A Survey on Digital Twin: From Industrial Applications to Cybersecurity." In 2024 IEEE Smart World Congress (SWC). IEEE, 2024. https://doi.org/10.1109/swc62898.2024.00323.
Full textKumari, Reetu, Sunil Kumar, Amandeep, Kamlesh Dutta, and Aparna Kumari. "Cybersecurity for Industrial IoT: A Review on Vulnerabilities and Attacks." In 2025 8th International Conference on Electronics, Materials Engineering & Nano-Technology (IEMENTech). IEEE, 2025. https://doi.org/10.1109/iementech65115.2025.10959356.
Full textGupta, Harshit, Luca D'Agati, Francesco Longo, Antonio Puliafito, and Giovanni Merlino. "Operational Technologies in Industrial Control System: Cybersecurity Perspectives and Research Trends." In 2024 17th International Conference on Security of Information and Networks (SIN). IEEE, 2024. https://doi.org/10.1109/sin63213.2024.10871534.
Full textReports on the topic "Industrial cybersecurity"
Candell Jr., Richard, Timothy A. Zimmerman, and Keith A. Stouffer. An Industrial Control System Cybersecurity Performance Testbed. National Institute of Standards and Technology, 2015. http://dx.doi.org/10.6028/nist.ir.8089.
Full textBarnett, Robert, Richard Poland, and Ryan Cruz. Embedded Hardware Solution for Cybersecurity in Industrial Control Systems. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1476265.
Full textSmith, Rhett, and Roger Hill. Purpose-Engineered, Active-Defense Cybersecurity for Industrial Control Systems. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1909448.
Full textSullivan, Daniel T. Survey of Malware Threats and Recommendations to Improve Cybersecurity for Industrial Control Systems Version 1.0. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ada617910.
Full textPowell, Michael, Joseph Brule, Michael Pease, et al. Protecting Information and System Integrity in Industrial Control System Environments: Cybersecurity for the Manufacturing Sector. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.1800-10.
Full textAbassy, Malgorzata, and Weronika Krupa. Sino-Russo-Iranian Tech Cooperation as Threat for the EU: Systemic Approach. EuroHub4Sino, 2025. https://doi.org/10.31175/eh4s.3c7e.
Full textPasupuleti, Murali Krishna. Next-Generation Extended Reality (XR): A Unified Framework for Integrating AR, VR, and AI-driven Immersive Technologies. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv325.
Full textPasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.
Full textAmpatzidis, Yiannis, Mahendra Bhandari, Andres Ferreyra, et al. AI in Agriculture: Opportunities, Challenges, and Recommendations. Chair Alex Thomasson. Council for Agricultural Science and Technology, 2025. https://doi.org/10.62300/iaag042514.
Full textFY2019 Final Report for Industrial Base Cybersecurity Initiative (IBCI) Project. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1581185.
Full text