作者: 凝乳 時間: 2025-3-21 21:58 作者: 極少 時間: 2025-3-22 02:13 作者: GLOSS 時間: 2025-3-22 06:16
The Chinese Video Game Industryion Security (CAIRIS) platform to identify the safety and human factors issues in rail. We illustrate this approach with a case study, which provides a vehicle for increasing the existing collaboration between engineers in security, safety and human factors.作者: CT-angiography 時間: 2025-3-22 11:55 作者: 溫和女孩 時間: 2025-3-22 14:50
Connect and Protect: Requirements for Maritime Autonomous Surface Ship in Urban Passenger Transportato communicate in a reliable manner to provide safe and secure real-time operations. In this paper, we discuss the APS context, stakeholders, regulations, standards and functions in order to identify communication and cybersecurity requirements towards designing a secure communication architecture suitable for APS.作者: 溫和女孩 時間: 2025-3-22 17:38 作者: 純樸 時間: 2025-3-22 23:20 作者: 消毒 時間: 2025-3-23 02:38
The Chinese Story in Global Orderected. The reported method also detects the attack points, and 25 out of 53 points were detected. This study provides a detailed analysis of false positives and false negatives of the experimental results.作者: 抱狗不敢前 時間: 2025-3-23 09:32 作者: Obligatory 時間: 2025-3-23 12:06 作者: charisma 時間: 2025-3-23 14:43 作者: 排名真古怪 時間: 2025-3-23 20:45 作者: EXTOL 時間: 2025-3-24 00:00
Simulation-Based Evaluation of DDoS Against Smart Grid SCADAsWe analyzed the effects of DDoS-type attacks against SCADAs with different internal queue architectures used to manage the incoming messages, i.e. no queues, single queue and separate queue for each connected RTU.作者: 表示向下 時間: 2025-3-24 03:24 作者: Canvas 時間: 2025-3-24 07:45
The Chinese Video Game Industrynic IDs; and (vi) visual threat analytics. To highlight the interdependencies between cyber and cyber-physical threats in autonomous ships, MAINFRAME’s operation is evaluated through the liquefied natural gas (LNG) Carrier case study.作者: 噴出 時間: 2025-3-24 14:39
The Chinese in Britain, 1800-Presenties, number of clients, type of offered services etc.) are very rarely accounted, a fact that also affects the accuracy of the results. In this paper, a privacy impact assessment method that explicitly takes into account the organizational characteristics and employs a list of well-defined metrics as input, is presented.作者: Infusion 時間: 2025-3-24 18:08 作者: 殺人 時間: 2025-3-24 19:25
International Organization for Migrationir digital identity. They also demonstrate that users’ privacy concerns do not seem to affect the amount of information users choose to publish when shaping their digital identity. Finally, we show that particular characteristics of social networking platforms affect the way that users shape their digital identity and privacy behavior.作者: 拾落穗 時間: 2025-3-24 23:27
Francesco Carchedi,Marica FerriISO/IEC 27002:2013 that need to be extended in order to adequately meet, if/where possible, the data protection requirements that the GDPR imposes. Thus, an organisation that already follows ISO/IEC 27001:2013, can use this work as a basis for compliance with the GDPR.作者: 捏造 時間: 2025-3-25 06:05 作者: Lignans 時間: 2025-3-25 08:33 作者: AWL 時間: 2025-3-25 12:40
A Proposed Privacy Impact Assessment Method Using Metrics Based on Organizational Characteristicsies, number of clients, type of offered services etc.) are very rarely accounted, a fact that also affects the accuracy of the results. In this paper, a privacy impact assessment method that explicitly takes into account the organizational characteristics and employs a list of well-defined metrics as input, is presented.作者: 削減 時間: 2025-3-25 16:49 作者: Enzyme 時間: 2025-3-25 20:54 作者: 冥想后 時間: 2025-3-26 02:54 作者: boisterous 時間: 2025-3-26 06:08 作者: 聯(lián)邦 時間: 2025-3-26 10:27 作者: Estimable 時間: 2025-3-26 16:34
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/233831.jpg作者: 大量殺死 時間: 2025-3-26 18:38 作者: debase 時間: 2025-3-27 00:09
Computer Security978-3-030-42048-2Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 防銹 時間: 2025-3-27 02:33 作者: Indecisive 時間: 2025-3-27 08:08 作者: WATER 時間: 2025-3-27 10:33
https://doi.org/10.1007/978-3-031-41504-3ies comes at the cost of introducing new security threats that need to be handled properly. Threats must be addressed at cyber and physical domains at the same time in order to detect and automatically mitigate the threats. In this paper, we elaborate an approach to attenuate cyber-physical attacks 作者: browbeat 時間: 2025-3-27 17:31
https://doi.org/10.1007/978-3-031-41504-3t and share, and the potential impact a data breach can have in people’s lives, securing communication and access to data in IoT has become a critical feature. Multiple application layer protocols are used nowadays in IoT, with the Constrained Application Protocol (CoAP) and the Message Queue Teleme作者: 豐滿有漂亮 時間: 2025-3-27 18:59 作者: innate 時間: 2025-3-27 22:13 作者: 拱形面包 時間: 2025-3-28 03:47
https://doi.org/10.1007/978-3-031-41504-3mart grid Supervisory Control and Data Acquisition systems, i.e. SCADAs. We will analyze attacks which are launched from compromised Remote Terminal Units (RTUs) located in the process environment. We created an ICS testbed and industrial DDoS simulator environment consisting of a single C&C server 作者: 異端邪說下 時間: 2025-3-28 06:55 作者: addict 時間: 2025-3-28 12:21
The Chinese Video Game Industrymework Sharemind. Even though Sharemind comes with provable security guarantees and an application development framework, the proposed protocol and its implementation contain a number of flaws making the result insecure. We hope this case study serves as a good educational material for future secure作者: Influx 時間: 2025-3-28 18:00 作者: Ballerina 時間: 2025-3-28 20:19
Gregor Benton,Edmund Terence Gomez of the final system. Security requirements modelling approaches allow the prevention of cyber incidents; however, the focus to date has been on prevention rather than resiliency. Resiliency extends into the detection, mitigation and recovery after security violations. In this paper, we propose an e作者: charisma 時間: 2025-3-29 02:42
International Organization for Migration enable users to customize their digital identity at will and to disclose desirable elements of their personality. The processes by which users shape their digital identity through information disclosure are largely unknown, including the role of privacy concerns. In this paper we identify the data 作者: indifferent 時間: 2025-3-29 06:46 作者: 檔案 時間: 2025-3-29 11:13
Chinese in Russia: An Historical Perspectiveata subjects it turned out to be a significant challenge. Organizations need to make long and complex changes for the personal data processing activities to become GDPR compliant. Citizens as data subjects are empowered with new rights, which however they need to become aware of and understand. Fina作者: jet-lag 時間: 2025-3-29 12:47
https://doi.org/10.1007/978-1-349-26096-6idering inherent IoT characteristics like scalability, heterogeneity, dependency and dynamism. In one hand, traditional and emerging access control models cannot handle indeterminate data access scenarios in IoT by applying deterministic access policies. On the other hand, moving towards resilient a作者: 友好 時間: 2025-3-29 15:33 作者: dragon 時間: 2025-3-29 20:08 作者: 不愛防注射 時間: 2025-3-30 02:48 作者: Assignment 時間: 2025-3-30 05:09 作者: 不朽中國 時間: 2025-3-30 11:10 作者: FECK 時間: 2025-3-30 13:22 作者: discord 時間: 2025-3-30 17:26 作者: 排他 時間: 2025-3-30 22:26
Identifying Safety and Human Factors Issues in Rail Using IRIS and CAIRISapproach based on the Integrating Requirements and Information Security (IRIS) framework using Computer Aided Integration of Requirements and Information Security (CAIRIS) platform to identify the safety and human factors issues in rail. We illustrate this approach with a case study, which provides 作者: conspicuous 時間: 2025-3-31 04:26
How Not to Use a Privacy-Preserving Computation Platform: Case Study of a Voting Applicationmework Sharemind. Even though Sharemind comes with provable security guarantees and an application development framework, the proposed protocol and its implementation contain a number of flaws making the result insecure. We hope this case study serves as a good educational material for future secure作者: 強化 時間: 2025-3-31 06:40 作者: Haphazard 時間: 2025-3-31 12:18