Academic literature on the topic 'Industrial cybersecurity'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Industrial cybersecurity.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Industrial cybersecurity"

1

Shikhaliyev, Ramiz. "CYBERSECURITY ANALYSIS OF INDUSTRIAL CONTROL SYSTEMS." Problems of Information Society 14, no. 2 (2023): 47–54. http://dx.doi.org/10.25045/jpis.v14.i2.06.

Full text
Abstract:
The current frontiers in the description and simulation of advanced physical and biological Industrial control systems (ICS) used to control various critical industrial and social systems. ICS integrates modern computing, communication, and Internet technologies. The integration of these technologies makes ICS open to the outside world, which makes it vulnerable to various cyber-attacks. ICS’s cybersecurity is becoming one of the most important issues due to the significant damage caused by cyberattacks to organizations and society. This article analyzes the cybersecurity issues of ICS. In par
APA, Harvard, Vancouver, ISO, and other styles
2

Kind, Andreas. "The Power of Industrial Cybersecurity." Digitale Welt 5, no. 1 (2020): 18–21. http://dx.doi.org/10.1007/s42354-020-0316-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

POCHMARA, Janusz. "Industrial cybersecurity and machine learning." PRZEGLĄD ELEKTROTECHNICZNY 1, no. 4 (2025): 86–90. https://doi.org/10.15199/48.2025.04.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Merzlikin, Eugene, and Ievgen Babeshko. "CYBERSECURITY ANALYSIS OF WEB-ORIENTED INDUSTRIAL IOT-SYSTEMS." Innovative Technologies and Scientific Solutions for Industries, no. 2 (24) (August 5, 2023): 131–44. http://dx.doi.org/10.30837/itssi.2023.24.131.

Full text
Abstract:
In modern world cybersecurity ensuring is one of the most crucial issues, especially in the context of the dynamic development of web-oriented industrial Internet of Things (IoT) systems. The subject of research of the paper is cybersecurity ensuring of web-oriented industrial IoT systems. The purpose of the paper is to analyze existing methods of cybersecurity analysis, identify limitations, and formulate requirements for a new assessment concept, which includes ways to eliminate identified limitations. Tasks to be solved: analysis of existing methods, tools and technologies for the organizat
APA, Harvard, Vancouver, ISO, and other styles
5

Shikhaliyev, Ramiz H. "CYBERSECURITY RISKS MANAGEMENT OF INDUSTRIAL CONTROL SYSTEMS: A REVIEW." Problems of Information Technology 15, no. 1 (2024): 37–43. http://dx.doi.org/10.25045/jpit.v15.i1.05.

Full text
Abstract:
Industrial control systems (ICS) form the basis of critical infrastructures, managing complex processes in various sectors of industry, energy, etc. With the increasing frequency and complexity of cyber threats, effective management of ICS cybersecurity risks is critical. This paper is devoted to the analysis of approaches used in the field of cybersecurity risk management of automated process control systems. The study examines the cybersecurity risks of ICS and the role of international standards in managing cybersecurity risks. The results of the analysis carried out in this paper can serve
APA, Harvard, Vancouver, ISO, and other styles
6

Timmers, Paul. "The European Union’s cybersecurity industrial policy." Journal of Cyber Policy 3, no. 3 (2018): 363–84. http://dx.doi.org/10.1080/23738871.2018.1562560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Goebel, Kai, and Shantanu Rane. "AI in Industrial IoT Cybersecurity [Industrial and Governmental Activities]." IEEE Computational Intelligence Magazine 19, no. 1 (2024): 14–15. http://dx.doi.org/10.1109/mci.2023.3332547.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dorage, Sachin Vasant. "Cybersecurity in Industrial Management within the Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–16. http://dx.doi.org/10.55041/ijsrem37081.

Full text
Abstract:
Recently, it has become important to integrate cybersecurity threat management policies in the management of any organization that uses information systems, whether large, medium or even small organizations. People live in the center of the field of smart homes, business opportunities of smart industrial cities and healthcare. Even as IoT security issues become increasingly ubiquitousin the industrial realm, they face the added challenge of evolving networks. Architecture towards the integration of information technology (IT) and operational technology (OT) networks. This article analyzes the
APA, Harvard, Vancouver, ISO, and other styles
9

Carpenter, Chris. "Industrial Cybersecurity, Process Safety, and Human Factors: A 360° Approach." Journal of Petroleum Technology 76, no. 08 (2024): 79–82. http://dx.doi.org/10.2118/0824-0079-jpt.

Full text
Abstract:
_ This article, written by JPT Technology Editor Chris Carpenter, contains highlights of paper OTC 35396, “Industrial Cybersecurity, Process Safety, and Human Factors: A Comprehensive 360° Approach,” by Pedro F. Vieira, Lenissa P. Hilgert, and Ilton Majerowicz, Petrobras. The paper has not been peer reviewed. Copyright 2024 Offshore Technology Conference. _ The complete paper presents an integrated view of three key areas of knowledge that are typically addressed individually—cybersecurity, process safety, and human factors—from the perspective of cybersecurity. It discusses information techno
APA, Harvard, Vancouver, ISO, and other styles
10

Morozova, Olga, Andrii Nicheporuk, Artem Tetskyi, and Vitalii Tkachov. "Methods and technologies for ensuring cybersecurity of industrial and web-oriented systems and networks." RADIOELECTRONIC AND COMPUTER SYSTEMS, no. 4 (November 29, 2021): 145–56. http://dx.doi.org/10.32620/reks.2021.4.12.

Full text
Abstract:
The subject matter of the article is methods and technologies of ensuring the cybersecurity of industrial and web-oriented systems and networks, training of cybersecurity specialists during the acquisition of professional knowledge. The purpose of the article is to ensure the cybersecurity of industrial and web-oriented systems and networks by developing and implementing appropriate methodologies (concepts, principles, set of models, methods) and technologies in the industry, as well as in training the cybersecurity specialists during the acquisition of professional knowledge. The problem of d
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Industrial cybersecurity"

1

Stewart, Alexander. "The Community Defense Approach: A Human Approach to Cybersecurity for Industrial and Manufacturing Systems." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1562059795078067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

GAGGERO, GIOVANNI BATTISTA. "Machine Learning based Anomaly Detection for Cybersecurity Monitoring of Critical Infrastructures." Doctoral thesis, Università degli studi di Genova, 2022. http://hdl.handle.net/11567/1068918.

Full text
Abstract:
Managing critical infrastructures requires to increasingly rely on Information and Communi- cation Technologies. The last past years showed an incredible increase in the sophistication of attacks. For this reason, it is necessary to develop new algorithms for monitoring these infrastructures. In this scenario, Machine Learning can represent a very useful ally. After a brief introduction on the issue of cybersecurity in Industrial Control Systems and an overview of the state of the art regarding Machine Learning based cybersecurity monitoring, the present work proposes three approaches th
APA, Harvard, Vancouver, ISO, and other styles
3

Mantere, M. (Matti). "Network security monitoring and anomaly detection in industrial control system networks." Doctoral thesis, Oulun yliopisto, 2015. http://urn.fi/urn:isbn:9789526208152.

Full text
Abstract:
Abstract Industrial control system (ICS) networks used to be isolated environments, typically separated by physical air gaps from the wider area networks. This situation has been changing and the change has brought with it new cybersecurity issues. The process has also exacerbated existing problems that were previously less exposed due to the systems’ relative isolation. This process of increasing connectivity between devices, systems and persons can be seen as part of a paradigm shift called the Internet of Things (IoT). This change is progressing and the industry actors need to take it into
APA, Harvard, Vancouver, ISO, and other styles
4

Koucham, Oualid. "Détection d'intrusions pour les systèmes de contrôle industriels." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAT090/document.

Full text
Abstract:
L’objectif de ce travail de thèse est le développement de techniques de détection d’intrusions et de corrélation d’alertes spécifiques aux systèmes de contrôle industriels (ICS). Cet intérêt est justifié par l’émergence de menaces informatiques visant les ICS, et la nécessité de détecter des attaques ciblées dont le but est de violer les spécifications sur le comportement correct du processus physique.Dans la première partie de nos travaux, nous nous sommes intéressés à l’inférence automatique de spécifications pour les systèmes de contrôle séquentiels et ce à des fins de détection d’intrusion
APA, Harvard, Vancouver, ISO, and other styles
5

Dell'Elce, Martina. "Industria 4.0 ed Internet of Things, nuove sfide per la cybersecurity." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.

Find full text
Abstract:
Al giorno d'oggi siamo sempre più circondati da dispositivi interconnessi tra loro, i quali sono costantemente esposti ad attacchi informatici. In questo elaborato, dopo aver introdotto l'Internet of Things e i suoi molteplici ambiti applicativi, verrà svolta un'attenta analisi dei rischi e delle sfide riguardanti la cybersecurity che le aziende 4.0 dovranno affrontare. Verranno proposte delle possibili soluzioni attraverso l'impiego di tecnologie sempre più sofisticate ed innovative.
APA, Harvard, Vancouver, ISO, and other styles
6

Kabore, Raogo. "Hybrid deep neural network anomaly detection system for SCADA networks." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0190.

Full text
Abstract:
Les systèmes SCADA sont de plus en plus ciblés par les cyberattaques en raison de nombreuses vulnérabilités dans le matériel, les logiciels, les protocoles et la pile de communication. Ces systèmes utilisent aujourd'hui du matériel, des logiciels, des systèmes d'exploitation et des protocoles standard. De plus, les systèmes SCADA qui étaient auparavant isolés sont désormais interconnectés aux réseaux d'entreprise et à Internet, élargissant ainsi la surface d'attaque. Dans cette thèse, nous utilisons une approche deep learning pour proposer un réseau de neurones profonds hybride efficace pour l
APA, Harvard, Vancouver, ISO, and other styles
7

Sicard, Franck. "Prise en compte des risques de cyber-attaques dans le domaine de la sécurité des systèmes cyber-physiques : proposition de mécanismes de détection à base de modèles comportementaux." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAT080/document.

Full text
Abstract:
Les systèmes de contrôle-commande industriels (Industrial Control System, ICS) sont des infrastructures constituées par un ensemble de calculateurs industriels reliés en réseau et permettant de contrôler un système physique. Ils assurent le pilotage de réseaux électriques (Smart Grid), de systèmes de production, de transports, de santé ou encore de systèmes d’armes. Pensés avant tout pour assurer productivité et respect de la mission dans un environnement non malveillant, les ICS sont, depuis le 21ème siècle, de plus en plus vulnérables aux attaques (Stuxnet, Industroyer, Triton, …) notamment
APA, Harvard, Vancouver, ISO, and other styles
8

Jo, Arrah-Marie. "Economics of information security and the market for software vulnerabilities." Electronic Thesis or Diss., Institut polytechnique de Paris, 2019. http://www.theses.fr/2019IPPAT003.

Full text
Abstract:
L'environnement cybernétique est devenu un maillon essentiel au fonctionnement de notre société et de nos activités socio-économiques. Cette transformation va de pair avec un changement d’échelle et de portée des menaces de sécurité numérique, qui deviennent d’autant plus nombreuses et plus sophistiquées. Dans un environnement mondialisé où les systèmes sont connectés à de millions d’autres systèmes, les parties prenantes sont engagés dans de multiples interactions stratégiques. Qui doit-on responsabiliser et de quelle manière, afin d’inciter à une gestion efficace de la sécurité ? De quelle f
APA, Harvard, Vancouver, ISO, and other styles
9

Seng, Sorithy. "Sonde de détection d'intrusion réseau avec suivi d'état de protocole et détection d'anomalie, de la modélisation à la combinaison entre des méthodes de spécification et de fouille de données (data mining)." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAS023.

Full text
Abstract:
Cette thèse se positionne dans le contexte des sondes de détection d'intrusion réseaux (NIDS). Elle part du constat que la grande majorité des NIDS disposent d'une vision statique des échanges réseaux : ils analysent les paquets réseaux sans tenir compte des échanges de paquets précédents. Cette vision statique limite leurs capacités à détecter des attaques se déroulant dans le temps et mettant en œuvre plusieurs paquets réseaux. Il existe bien évidemment des NIDS capables de détecter des attaques s'étalant sur plusieurs paquets, mais cela est en général réalisé à l'aide d'artifices non trivia
APA, Harvard, Vancouver, ISO, and other styles
10

Senate, University of Arizona Faculty. "Faculty Senate Minutes February 6, 2017." University of Arizona Faculty Senate (Tucson, AZ), 2017. http://hdl.handle.net/10150/622775.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Industrial cybersecurity"

1

Roth, Marc S. Information technology law institute 2013: Privacy and cybersecurity, mobile advertising, digital distribution, social media and the third industrial revolution. Practising Law Institute, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Flaus, Jean-Marie. Cybersecurity of Industrial Systems. Wiley & Sons, Incorporated, John, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Flaus, Jean-Marie. Cybersecurity of Industrial Systems. Wiley & Sons, Incorporated, John, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Flaus, Jean-Marie. Cybersecurity of Industrial Systems. Wiley & Sons, Incorporated, John, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Flaus, Jean-Marie. Cybersecurity of Industrial Systems. Wiley & Sons, Incorporated, John, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Macaulay, Tyson, and Bryan L. Singer. Cybersecurity for Industrial Control Systems. Auerbach Publications, 2016. http://dx.doi.org/10.1201/b11352.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Industrial Cybersecurity: Efficiently Monitor the Cybersecurity Posture of Your ICS Environment. Packt Publishing, Limited, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Industrial Cybersecurity: Efficiently Monitor the Cybersecurity Posture of Your ICS Environment. de Gruyter GmbH, Walter, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Industrial Cybersecurity: Efficiently Secure Critical Infrastructure Systems. de Gruyter GmbH, Walter, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Azizi, Neda, and Shahzaib Tahir. Strengthening Industrial Cybersecurity to Protect Business Intelligence. IGI Global, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Industrial cybersecurity"

1

Austin, Greg. "Chinese Views of the Cyber Industrial Complex." In Cybersecurity in China. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-68436-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Buja, Atdhe. "Cybersecurity Risk Assessment Methods." In Cybersecurity of Industrial Internet of Things (IIoT). CRC Press, 2025. https://doi.org/10.1201/9781003383253-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Möller, Dietmar P. F. "Cybersecurity in Cyber-Physical Systems." In Cyber-Physical Systems for Industrial Transformation. CRC Press, 2023. http://dx.doi.org/10.1201/9781003262527-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Buja, Atdhe. "Effective Cybersecurity Countermeasures for Industrial IoT." In Cybersecurity of Industrial Internet of Things (IIoT). CRC Press, 2025. https://doi.org/10.1201/9781003383253-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fowler, Bradley, and Bruce G. Chaundy. "Psychology of Industrial Organizational Cybersecurity Leadership." In Cybersecurity Leadership for Healthcare Organizations and Institutions of Higher Education. River Publishers, 2025. https://doi.org/10.1201/9788770047760-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Buja, Atdhe. "Introduction to Industrial Infrastructure." In Cybersecurity of Industrial Internet of Things (IIoT). CRC Press, 2025. https://doi.org/10.1201/9781003383253-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ionescu, Octavian, Viorel Dumitru, Emil Pricop, and Stefan Pircalabu. "Innovative Hardware-Based Cybersecurity Solutions." In Recent Developments on Industrial Control Systems Resilience. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31328-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Janicke, Helge, Richard Smith, Leandros Maglaras, Allan Cook, Ying He, and Fenia Ferra. "Agile Incident Response in Industrial Control Environments." In Cybersecurity Issues in Emerging Technologies. CRC Press, 2021. http://dx.doi.org/10.1201/9781003109952-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rehan, Syed. "Industrial IoT with AWS IoT." In AWS IoT With Edge ML and Cybersecurity. Apress, 2023. http://dx.doi.org/10.1007/979-8-8688-0011-5_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Buja, Atdhe. "Implementation of the IIoT Cybersecurity Countermeasures." In Cybersecurity of Industrial Internet of Things (IIoT). CRC Press, 2025. https://doi.org/10.1201/9781003383253-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Industrial cybersecurity"

1

Chaiyasoonthorn, Sawatsakorn, Somsak Mitatha, Surapong Siripongdee, Montri Wiboonrat, and Theeraporn Sriudomsilp. "Cybersecurity for Industrial Control Systems." In 2024 9th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM). IEEE, 2024. http://dx.doi.org/10.1109/seeda-cecnsm63478.2024.00013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Laan, Nathan, Rahul Gupta, Alexander W. Koehler, and Wesley Van Hill. "Implementing Cybersecurity for Industrial-Connected Products." In 2024 IEEE IAS Petroleum and Chemical Industry Technical Conference (PCIC). IEEE, 2024. https://doi.org/10.1109/pcic47799.2024.10832232.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kabulov, I., C. Karthikeyan, Prashant Chourasiya, Sandeep Singh, Myasar Mundher Adnan, and Arti Badhoutiya. "Contemporary Cybersecurity Framework for Industrial Cloud Deployment." In 2024 International Conference on Communication, Computing and Energy Efficient Technologies (I3CEET). IEEE, 2024. https://doi.org/10.1109/i3ceet61722.2024.10993635.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Soudan, Bassel. "Cybersecurity of Digital Twins in Industrial IoT Environments." In 2024 Advances in Science and Engineering Technology International Conferences (ASET). IEEE, 2024. http://dx.doi.org/10.1109/aset60340.2024.10708640.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Korn, Brian, Doug Suerich, Andrew Seward, and Mayura Padmanabhan. "An Industry Plan for Cybersecurity : IE: Industrial Engineering." In 2025 36th Annual SEMI Advanced Semiconductor Manufacturing Conference (ASMC). IEEE, 2025. https://doi.org/10.1109/asmc64512.2025.11010241.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Cynthia, Ranjan Pal, Corwin Nicholson, and Michael Siegel. "(Gen)AI Versus (Gen)AI in Industrial Control Cybersecurity." In 2024 Winter Simulation Conference (WSC). IEEE, 2024. https://doi.org/10.1109/wsc63780.2024.10838831.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Iosif, Andrei-Cristian, Ulrike Lechner, Maria Pinto-Albuquerque, and Tiago Espinha Gasiba. "Serious Game for Industrial Cybersecurity: Experiential Learning Through Code Review." In 2024 36th International Conference on Software Engineering Education and Training (CSEE&T). IEEE, 2024. http://dx.doi.org/10.1109/cseet62301.2024.10663058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Patel, Hiren, Asma Jodeiri Akbarfam, and Hoda Maleki. "A Survey on Digital Twin: From Industrial Applications to Cybersecurity." In 2024 IEEE Smart World Congress (SWC). IEEE, 2024. https://doi.org/10.1109/swc62898.2024.00323.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kumari, Reetu, Sunil Kumar, Amandeep, Kamlesh Dutta, and Aparna Kumari. "Cybersecurity for Industrial IoT: A Review on Vulnerabilities and Attacks." In 2025 8th International Conference on Electronics, Materials Engineering & Nano-Technology (IEMENTech). IEEE, 2025. https://doi.org/10.1109/iementech65115.2025.10959356.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gupta, Harshit, Luca D'Agati, Francesco Longo, Antonio Puliafito, and Giovanni Merlino. "Operational Technologies in Industrial Control System: Cybersecurity Perspectives and Research Trends." In 2024 17th International Conference on Security of Information and Networks (SIN). IEEE, 2024. https://doi.org/10.1109/sin63213.2024.10871534.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Industrial cybersecurity"

1

Candell Jr., Richard, Timothy A. Zimmerman, and Keith A. Stouffer. An Industrial Control System Cybersecurity Performance Testbed. National Institute of Standards and Technology, 2015. http://dx.doi.org/10.6028/nist.ir.8089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Barnett, Robert, Richard Poland, and Ryan Cruz. Embedded Hardware Solution for Cybersecurity in Industrial Control Systems. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1476265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Smith, Rhett, and Roger Hill. Purpose-Engineered, Active-Defense Cybersecurity for Industrial Control Systems. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1909448.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sullivan, Daniel T. Survey of Malware Threats and Recommendations to Improve Cybersecurity for Industrial Control Systems Version 1.0. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ada617910.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Powell, Michael, Joseph Brule, Michael Pease, et al. Protecting Information and System Integrity in Industrial Control System Environments: Cybersecurity for the Manufacturing Sector. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.1800-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Abassy, Malgorzata, and Weronika Krupa. Sino-Russo-Iranian Tech Cooperation as Threat for the EU: Systemic Approach. EuroHub4Sino, 2025. https://doi.org/10.31175/eh4s.3c7e.

Full text
Abstract:
The strategic convergence between Russia, Iran, and China poses a growing systemic threat to the European Union. Despite differing regional agendas, these three powers are increasingly aligned in key areas such as cybersecurity, military technology transfers, intelligence cooperation, and disinformation campaigns. Their coordinated efforts undermine the EU’s critical infrastructure, weaken its strategic autonomy, and erode trust in democratic institutions by targeting sectors such as energy, finance, healthcare, and electoral integrity. Although the EU has implemented sanctions and reinforced
APA, Harvard, Vancouver, ISO, and other styles
7

Pasupuleti, Murali Krishna. Next-Generation Extended Reality (XR): A Unified Framework for Integrating AR, VR, and AI-driven Immersive Technologies. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv325.

Full text
Abstract:
Abstract: Extended Reality (XR), encompassing Augmented Reality (AR), Virtual Reality (VR), and Mixed Reality (MR), is evolving into a transformative technology with applications in healthcare, education, industrial training, smart cities, and entertainment. This research presents a unified framework integrating AI-driven XR technologies with computer vision, deep learning, cloud computing, and 5G connectivity to enhance immersion, interactivity, and scalability. AI-powered neural rendering, real-time physics simulation, spatial computing, and gesture recognition enable more realistic and adap
APA, Harvard, Vancouver, ISO, and other styles
8

Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.

Full text
Abstract:
Abstract: The rapid adoption of artificial intelligence (AI) in cloud and edge computing environments has transformed industries by enabling large-scale automation, real-time analytics, and intelligent decision-making. However, the increasing reliance on AI-powered infrastructures introduces significant cybersecurity challenges, including adversarial attacks, data privacy risks, and vulnerabilities in AI model supply chains. This research explores advanced cybersecurity frameworks tailored to protect AI-driven cloud and edge computing environments. It investigates AI-specific security threats,
APA, Harvard, Vancouver, ISO, and other styles
9

Ampatzidis, Yiannis, Mahendra Bhandari, Andres Ferreyra, et al. AI in Agriculture: Opportunities, Challenges, and Recommendations. Chair Alex Thomasson. Council for Agricultural Science and Technology, 2025. https://doi.org/10.62300/iaag042514.

Full text
Abstract:
Artificial Intelligence (AI) is rapidly being integrated into people’s lives, reshaping industries, and enabling previously unimagined innovation, even in agriculture. Generative AI focuses on creating content like text and pictures based on vast quantities of data. ExtensionBot is a generative AI platform that supports agricultural extension by providing farmers with accurate scientific information and specific recommendations. It has been shown to deliver more accurate responses to agricultural questions than broader generative AI models. Other forms of AI have been used to analyze data to p
APA, Harvard, Vancouver, ISO, and other styles
10

FY2019 Final Report for Industrial Base Cybersecurity Initiative (IBCI) Project. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1581185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!