Dissertations / Theses on the topic 'Industrial cybersecurity'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 16 dissertations / theses for your research on the topic 'Industrial cybersecurity.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Stewart, Alexander. "The Community Defense Approach: A Human Approach to Cybersecurity for Industrial and Manufacturing Systems." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1562059795078067.
Full textGAGGERO, GIOVANNI BATTISTA. "Machine Learning based Anomaly Detection for Cybersecurity Monitoring of Critical Infrastructures." Doctoral thesis, Università degli studi di Genova, 2022. http://hdl.handle.net/11567/1068918.
Full textMantere, M. (Matti). "Network security monitoring and anomaly detection in industrial control system networks." Doctoral thesis, Oulun yliopisto, 2015. http://urn.fi/urn:isbn:9789526208152.
Full textKoucham, Oualid. "Détection d'intrusions pour les systèmes de contrôle industriels." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAT090/document.
Full textDell'Elce, Martina. "Industria 4.0 ed Internet of Things, nuove sfide per la cybersecurity." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Find full textKabore, Raogo. "Hybrid deep neural network anomaly detection system for SCADA networks." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0190.
Full textSicard, Franck. "Prise en compte des risques de cyber-attaques dans le domaine de la sécurité des systèmes cyber-physiques : proposition de mécanismes de détection à base de modèles comportementaux." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAT080/document.
Full textJo, Arrah-Marie. "Economics of information security and the market for software vulnerabilities." Electronic Thesis or Diss., Institut polytechnique de Paris, 2019. http://www.theses.fr/2019IPPAT003.
Full textSeng, Sorithy. "Sonde de détection d'intrusion réseau avec suivi d'état de protocole et détection d'anomalie, de la modélisation à la combinaison entre des méthodes de spécification et de fouille de données (data mining)." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAS023.
Full textSenate, University of Arizona Faculty. "Faculty Senate Minutes February 6, 2017." University of Arizona Faculty Senate (Tucson, AZ), 2017. http://hdl.handle.net/10150/622775.
Full textЄвсєєв, В. В., and Н. П. Демська. "Researching Cyberattacks Methods in Industrial Internet of Things." Thesis, 2021. https://openarchive.nure.ua/handle/document/18319.
Full textCoutinho, Bruno Filipe Passos Ferraz. "Healthcare systems protection: All-in-one cybersecurity approach." Master's thesis, 2021. http://hdl.handle.net/10071/24126.
Full text(6623090), Gregory Walkup. "Investigating Attacks on Industrial Control Systems Using Deterministic Replay Simulation." Thesis, 2019.
Find full textSilva, Pedro Miguel Lopes Martins da. "Gestão de cibersegurança em organizações financeiras." Master's thesis, 2018. http://hdl.handle.net/10071/18379.
Full textAfzaliSeresht, Neda. "Explainable Intelligence for Comprehensive Interpretation of Cybersecurity Data in Incident Management." Thesis, 2022. https://vuir.vu.edu.au/44414/.
Full textChenthara, Shekha. "Privacy Preservation of Electronic Health Records Using Blockchain Technology: Healthchain." Thesis, 2021. https://vuir.vu.edu.au/42459/.
Full text