Search

Your search keyword '"Infrastructure security"' showing total 304 results

Search Constraints

Start Over You searched for: Descriptor "Infrastructure security" Remove constraint Descriptor: "Infrastructure security"
304 results on '"Infrastructure security"'

Search Results

3. Cyber Security Challenges in the Transportation Industry - A Comprehensive Analysis and Recommendations.

4. Enhancing Security for Private Cloud When Deployed at Small Department

8. Homeland security research opportunities.

9. CRITICAL INFRASTRUCTURE SECURITY MANAGEMENT.

10. Intelligent Security Strategy Based on the Selection of the Computer and Neural Network Architecture.

12. АНАЛІЗ МЕТОДОЛОГІЇ DEVSECOPS В ПРОЦЕСАХ РОЗРОБКИ ПРОГРАМНОГО ЗАБЕЗПЕЧЕННЯ

13. A Survey on SCADA Security and Honeypot in Industrial Control System

14. Switched-Based Resilient Control of Cyber-Physical Systems

16. Comparing IO Visor and Pcap for Security Inspection of Traced Packets from SmartX Box

17. Domain Name System Without Root Servers

18. Autonomous long-range drone detection system for critical infrastructure safety.

19. Discovering the Hidden Community Structure of Public Transportation Networks.

20. Optimization Problems in Infrastructure Security

21. A Review of Intelligent Infrastructure Surveillance to Support Safe Autonomy in Smart-Railways

22. Securing Infrastructure Facilities: When Does Proactive Defense Help?

23. Monitoring Oil Pipeline Infrastructures with Multiple Unmanned Aerial Vehicles

24. Infrastructure Security of the Ural Regions: Assessment Technique and Diagnostic Results

25. Trial Implementation of a Multihazard Risk Assessment Framework for High-Impact Low-Frequency Power Grid Events.

26. A Decision Framework for Managing the Risk of Terrorist Threats at Rail Stations Interconnected with Airports.

30. Simulation of Internet DDoS Attacks and Defense

31. Cybersecurity Standards in the Context of Operating System

32. Detection of Floating Objects Based on Hydroacoustic and Hydrodynamic Pressure Measurements in the Coastal Zone

33. A Decision Framework for Managing the Risk of Terrorist Threats at Rail Stations Interconnected with Airports

34. Development of Security Performance and Comparative Analyses Process for Big Data in Cloud

35. A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools

37. Assuring the Optimum Security Level for Network, Physical and Cloud Infrastructure

38. Switched-Based Resilient Control of Cyber-Physical Systems

39. Decentralized gene regulatory networks: An approach to energy efficient node coordination with delay constraints for wireless sensor systems

41. Analisis Tata Kelola Teknologi Informasi pada Layanan Infrastruktur Jaringan RSUD Provinsi NTB menggunakan COBIT 4.1

42. Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia

43. Applications of underground structures for the physical protection of critical infrastructure

44. Smart Grid Anomaly Detection using a Deep Learning Digital Twin

45. Trains Detection Using State of Polarization Changes Measurement and Convolutional Neural Networks

46. Using 3D Models And Discrete Simulations In Infrastructure Security Applications.

47. Our historians: the court and the FCC. Foreign ownership regulations and legislative history as a framing device.

48. Solutions for IoT System Security

49. Study on the Security Protection System of Foreign Satellite Navigation System Infrastructure

50. Critical Infrastructures and Safeguarding the City’s Sustainability and Peace

Catalog

Books, media, physical & digital resources