-
1
-
-
84921300723
-
A cyber-physical systems architecture for industry 4.0-based manufacturing systems
-
Lee, J., Bagheri, B., Kao, H.A. A cyber-physical systems architecture for industry 4.0-based manufacturing systems. Manufacturing Letters 2015;3:18-23.
-
(2015)
Manufacturing Letters
, vol.3
, pp. 18-23
-
-
Lee, J.1
Bagheri, B.2
Kao, H.A.3
-
2
-
-
84904510850
-
Cyber-physical production systems: Roots, expectations and R&D challenges
-
Variety Management in ManufacturingProceedings of the 47th CIRP Conf. on Manufacturing Systems.
-
Monostori, L. Cyber-physical production systems: Roots, expectations and R&D challenges. Procedia CIRP 2014;17:9-13. Variety Management in ManufacturingProceedings of the 47th CIRP Conf. on Manufacturing Systems.
-
(2014)
Procedia CIRP
, vol.17
, pp. 9-13
-
-
Monostori, L.1
-
3
-
-
84914122490
-
-
chap. Die Vierte Industrielle Revolution - Der Weg in ein wertschaffendes Produktionsparadigma. Wiesbaden: Springer Fachmedien, Wiesbaden
-
Bauernhansl, T. Industrie 4.0 in Produktion, Automatisierung und Logistik: Anwendung, Technologien, Migration; chap. Die Vierte Industrielle Revolution - Der Weg in ein wertschaffendes Produktionsparadigma. Wiesbaden: Springer Fachmedien, Wiesbaden, ISBN., 978-3-658-04682-8, 2014, p. 5-35.
-
(2014)
Industrie 4.0 in Produktion, Automatisierung und Logistik: Anwendung, Technologien, Migration
, pp. 5-35
-
-
Bauernhansl, T.1
-
4
-
-
84914122490
-
-
chap. Industrie 4.0-Readiness: Migration zur Industrie 4.0-Fertigung. Wiesbaden: Springer Fachmedien Wiesbaden
-
Bildstein, A., Seidelmann, J. Industrie 4.0 in Produktion, Automatisierung und Logistik: Anwendung, Technologien, Migration; chap. Industrie 4.0-Readiness: Migration zur Industrie 4.0-Fertigung. Wiesbaden: Springer Fachmedien Wiesbaden. ISBN 978-3-658-04682-8; 2014, p. 581-597.
-
(2014)
Industrie 4.0 in Produktion, Automatisierung und Logistik: Anwendung, Technologien, Migration
, pp. 581-597
-
-
Bildstein, A.1
Seidelmann, J.2
-
5
-
-
79957616447
-
Stuxnet: Dissecting a cyberwarfare weapon
-
Langner, R. Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security and Privacy 2011;9(3):49-51. doi:10.1109/MSP. 2011.67.
-
(2011)
IEEE Security and Privacy
, vol.9
, Issue.3
, pp. 49-51
-
-
Langner, R.1
-
6
-
-
84894191142
-
The cousins of stuxnet: Duqu, Flame, and Gauss
-
Bencsáth, B., Pék, G., Buttyán, L., Félegyházi, M. The cousins of Stuxnet: Duqu, Flame, and Gauss. Future Internet 2012;4(4):971. doi:10.3390/fi4040971.
-
(2012)
Future Internet
, vol.4
, Issue.4
, pp. 971
-
-
Bencsáth, B.1
-
7
-
-
84879869031
-
Secure information sharing in digital supply chains
-
IEEE
-
Bhargava, B., Ranchal, R., Ben Othmane, L. Secure information sharing in digital supply chains. In: Advance Computing Conference (IACC), 2013 IEEE 3rd International. IEEE; 2013, p. 1636-1640.
-
(2013)
Advance Computing Conference (IACC), 2013 IEEE 3rd International
, pp. 1636-1640
-
-
Bhargava, B.1
Ranchal, R.2
Ben Othmane, L.3
-
8
-
-
84941569632
-
-
1st ed.; Syngress Publishing 9781597494243.
-
Clarke, J. SQL Injection Attacks and Defense. 1st ed.; Syngress Publishing; 2009. ISBN 1597494240, 9781597494243.
-
(2009)
SQL Injection Attacks and Defense
-
-
Clarke, J.1
-
9
-
-
77955046129
-
Hproxy: Client-side detection of SSL stripping attacks
-
Kreibich, C., Jahnke, M., editors DIMVA, 2010, Bonn, Germany, July 8-9, 2010. Proceedings; vol. 6201 of Lecture Notes in Computer Science. Springer
-
Nikiforakis, N., Younan, Y., Joosen, W. Hproxy: Client-side detection of SSL stripping attacks. In: Kreibich, C., Jahnke, M., editors. Detection of Intrusions and Malware, and Vulnerability Assessment, 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010. Proceedings; vol. 6201 of Lecture Notes in Computer Science. Springer. ISBN 978-3-642-14214-7; 2010, p. 200-218. doi:10.1007/978-3-642-14215-4 12.
-
(2010)
Detection of Intrusions and Malware, and Vulnerability Assessment, 7th International Conference
, pp. 200-218
-
-
Nikiforakis, N.1
Younan, Y.2
Joosen, W.3
-
10
-
-
84966318447
-
Internet-facing PLCs as a network backdoor
-
IEEE
-
Klick, J., Lau, S., Marzin, D., Malchow, J.O., Roth, V. Internet-facing PLCs as a network backdoor. In: Communications and Network Security (CNS), 2015 IEEE Conference on. IEEE; 2015, p. 524-532.
-
(2015)
Communications and Network Security (CNS), 2015 IEEE Conference on
, pp. 524-532
-
-
Klick, J.1
Lau, S.2
Marzin, D.3
Malchow, J.O.4
Roth, V.5
-
11
-
-
84958581089
-
Implementing smart factory of Industrie 4.0: An outlook
-
Wang, S., Wan, J., Li, D., Zhang, C. Implementing smart factory of Industrie 4.0: an outlook. International Journal of Distributed Sensor Networks 2016;2016.
-
(2016)
International Journal of Distributed Sensor Networks
, pp. 2016
-
-
Wang, S.1
Wan, J.2
Li, D.3
Zhang, C.4
-
12
-
-
84918570655
-
Vulnerabilities of cyber-physical systems to stale data - Determining the optimal time to launch attacks
-
Krotofil, M., Cardenas, A., Larsen, J., Gollmann, D. Vulnerabilities of cyber-physical systems to stale data - determining the optimal time to launch attacks. International Journal of Critical Infrastructure Protection 2014;7(4):213-232.
-
(2014)
International Journal of Critical Infrastructure Protection
, vol.7
, Issue.4
, pp. 213-232
-
-
Krotofil, M.1
Cardenas, A.2
Larsen, J.3
Gollmann, D.4
-
13
-
-
84977150496
-
Will electrical cyber-physical interdependent networks undergo first-order transition under random attacks?
-
Ji, X., Wang, B., Liu, D., Dong, Z., Chen, G., Zhu, Z., et al. Will electrical cyber-physical interdependent networks undergo first-order transition under random attacks? Physica A: Statistical Mechanics and its Applications 2016;doi:http://dx.doi.org/10.1016/j.physa.2016.05.017.
-
(2016)
Physica A: Statistical Mechanics and Its Applications
-
-
Ji, X.1
Wang, B.2
Liu, D.3
Dong, Z.4
Chen, G.5
Zhu, Z.6
-
14
-
-
84890348535
-
Cyber-physical security: A game theory model of humans interacting over control systems
-
Backhaus, S., Bent, R., Bono, J., Lee, R., Tracey, B., Wolpert, D., et al. Cyber-physical security: A game theory model of humans interacting over control systems. Smart Grid, IEEE Transactions on 2013;4(4):2320-2327.
-
(2013)
Smart Grid, IEEE Transactions on
, vol.4
, Issue.4
, pp. 2320-2327
-
-
Backhaus, S.1
Bent, R.2
Bono, J.3
Lee, R.4
Tracey, B.5
Wolpert, D.6
-
16
-
-
84897584743
-
Preventing private information inference attacks on social networks
-
Heatherly, R., Kantarcioglu, M., Thuraisingham, B.M. Preventing private information inference attacks on social networks. IEEE Trans on Knowl and Data Eng 2013;25(8):1849-1862. doi:10.1109/TKDE. 2012.120.
-
(2013)
IEEE Trans on Knowl and Data Eng
, vol.25
, Issue.8
, pp. 1849-1862
-
-
Heatherly, R.1
Kantarcioglu, M.2
Thuraisingham, B.M.3
-
17
-
-
84999054175
-
Data protection compliance regulations and implications for smart factories of the future
-
London, United Kingdom, September 14-16 (to appear)
-
Preuveneers, D., Joosen, W., Ilie-Zudor, E. Data Protection Compliance Regulations and Implications for Smart Factories of the Future. In: 2016 International Conference on Intelligent Environments, IE 2016, London, United Kingdom, September 14-16. 2016 (to appear),.
-
(2016)
2016 International Conference on Intelligent Environments, IE 2016
-
-
Preuveneers, D.1
Joosen, W.2
Ilie-Zudor, E.3
-
18
-
-
0035387175
-
Transforming the "weakest Link' - A Human/Computer Interaction Approach to Usable and Effective Security
-
Sasse, M.A., Brostoff, S., Weirich, D. Transforming the "Weakest Link' - a Human/Computer Interaction Approach to Usable and Effective Security. BT Technology Journal 2001;19(3):122-131. doi:10.1023/A: 1011902718709.
-
(2001)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
19
-
-
84893502427
-
-
TrendLabs APT Research Team, Spear-Phishing Email: Most Favored APT Attack Bait Tech. Rep.; 2012 URL: http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-spear-phishing.-email-most-favored-apt-attack-bait.pdf.
-
(2012)
Spear-Phishing Email: Most Favored APT Attack Bait Tech. Rep.
-
-
-
20
-
-
84951909906
-
Advanced social engineering attacks
-
Krombholz, K., Hobel, H., Huber, M., Weippl, E. Advanced social engineering attacks. J Inf Secur Appl 2015; 22(C):113-122. doi:10.1016/j.jisa.2014.09.005.
-
(2015)
J Inf Secur Appl
, vol.22
, Issue.C
, pp. 113-122
-
-
Krombholz, K.1
Hobel, H.2
Huber, M.3
Weippl, E.4
-
21
-
-
10044258933
-
Overcoming impediments to information sharing
-
Aviram, A., Tor, A. Overcoming impediments to information sharing. Ala L Rev 2003;55:231.
-
(2003)
Ala L Rev
, vol.55
, pp. 231
-
-
Aviram, A.1
Tor, A.2
-
22
-
-
84919438219
-
An empirical investigation of extensible information sharing in supply chains: Going beyond dyadic
-
Chengalur-Smith, I., Duchessi, P. An empirical investigation of extensible information sharing in supply chains: Going beyond dyadic. Information Resources Management Journal (IRMJ) 2014;27(4):1-22.
-
(2014)
Information Resources Management Journal (IRMJ)
, vol.27
, Issue.4
, pp. 1-22
-
-
Chengalur-Smith, I.1
Duchessi, P.2
-
23
-
-
84872577303
-
The impact of cognitive anchors on information- sharing behaviour
-
Kimmerle, J., Cress, U. The impact of cognitive anchors on information- sharing behavior. Cyberpsychology, Behavior, and Social Networking 2013;16(1):45-49.
-
(2013)
Cyberpsychology, Behavior, and Social Networking
, vol.16
, Issue.1
, pp. 45-49
-
-
Kimmerle, J.1
Cress, U.2
-
24
-
-
84908573455
-
Effects of managerial ties and trust on supply chain information sharing and supplier opportunism
-
Wang, Z., Ye, F., Tan, K.H. Effects of managerial ties and trust on supply chain information sharing and supplier opportunism. International Journal of Production Research 2014;52(23):7046-7061.
-
(2014)
International Journal of Production Research
, vol.52
, Issue.23
, pp. 7046-7061
-
-
Wang, Z.1
Ye, F.2
Tan, K.H.3
-
25
-
-
77954339615
-
Resonance: Dynamic access control for enterprise networks
-
ACM
-
Nayak, A.K., Reimers, A., Feamster, N., Clark, R. Resonance: dynamic access control for enterprise networks. In: Proceedings of the 1st ACM workshop on Research on enterprise networking. ACM; 2009, p. 11-18.
-
(2009)
Proceedings of the 1st ACM Workshop on Research on Enterprise Networking
, pp. 11-18
-
-
Nayak, A.K.1
Reimers, A.2
Feamster, N.3
Clark, R.4
-
26
-
-
68649129121
-
OpenFlow: Enabling innovation in campus networks
-
McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., et al. OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review 2008;38(2):69-74.
-
(2008)
ACM SIGCOMM Computer Communication Review
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
-
28
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
New York, NY, USA: ACM
-
Hacigümüş, H., Iyer, B., Li, C., Mehrotra, S. Executing sql over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data. SIGMOD "02; New York, NY, USA: ACM. ISBN 1-58113-497-5; 2002, p. 216-227. doi:10.1145/564691.564717.
-
(2002)
Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data. SIGMOD "02
, pp. 216-227
-
-
Hacigümüş, H.1
-
29
-
-
84954121689
-
Inference attacks on property- preserving encrypted databases
-
CCS "15; New York, NY, USA: ACM
-
Naveed, M., Kamara, S., Wright, C.V. Inference attacks on property- preserving encrypted databases. In: Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security. CCS "15; New York, NY, USA: ACM. ISBN 978-1-4503-3832-5; 2015, p. 644-655 doi:10.1145/2810103.2813651.
-
(2015)
Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security
, pp. 644-655
-
-
Naveed, M.1
Kamara, S.2
Wright, C.V.3
-
30
-
-
84878355718
-
Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail
-
Washington, DC, USA: IEEE Computer Society
-
Dyer, K.P., Coull, S.E., Ristenpart, T., Shrimpton, T. Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy. SP "12; Washington, DC, USA: IEEE Computer Society. ISBN 978-0-7695-4681-0; 2012, p. 332-346. doi:10.1109/SP. 2012.28.
-
(2012)
Proceedings of the 2012 IEEE Symposium on Security and Privacy. SP "12
, pp. 332-346
-
-
Dyer, K.P.1
Coull, S.E.2
Ristenpart, T.3
Shrimpton, T.4
-
31
-
-
84945935753
-
Cloud-assisted industrial cyber-physical systems: An insight
-
Yue, X., Cai, H., Yan, H., Zou, C., Zhou, K. Cloud-assisted industrial cyber-physical systems: An insight. Microprocessors and Microsystems 2015;39(8):1262-1270.
-
(2015)
Microprocessors and Microsystems
, vol.39
, Issue.8
, pp. 1262-1270
-
-
Yue, X.1
Cai, H.2
Yan, H.3
Zou, C.4
Zhou, K.5
-
32
-
-
37149018890
-
A survey of lightweight-cryptography implementations
-
Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A., Uhsadel, L. A survey of lightweight-cryptography implementations. IEEE Des Test 2007;24(6):522-533. doi:10.1109/MDT. 2007.178.
-
(2007)
IEEE des Test
, vol.24
, Issue.6
, pp. 522-533
-
-
Eisenbarth, T.1
Kumar, S.2
Paar, C.3
Poschmann, A.4
Uhsadel, L.5
-
33
-
-
84893081352
-
Reverse-engineering a Cryptographic RFID Tag
-
Berkeley, CA, USA: USENIX Association
-
Nohl, K., Evans, D., Starbug, S., Plötz, H. Reverse-engineering a Cryptographic RFID Tag. In: Proceedings of the 17th Conference on Security Symposium. SS'08; Berkeley, CA, USA: USENIX Association; 2008, p. 185-193.
-
(2008)
Proceedings of the 17th Conference on Security Symposium. SS'08
, pp. 185-193
-
-
Nohl, K.1
-
34
-
-
84921068804
-
Implementing public-key cryptography on passive RFID tags is practical
-
Arbit, A., Livne, Y., Oren, Y., Wool, A. Implementing public-key cryptography on passive rfid tags is practical. International Journal of Information Security 2015;14(1):85-99. doi:10.1007/s10207-014-0236-y.
-
(2015)
International Journal of Information Security
, vol.14
, Issue.1
, pp. 85-99
-
-
Arbit, A.1
Livne, Y.2
Oren, Y.3
Wool, A.4
-
35
-
-
84941265672
-
Long-term growth and persistence with obsolescence
-
Barañano, I., Romero-Àvila, D. Long-term growth and persistence with. obsolescence. Economic Modelling 2015; 51(C):328-339.
-
(2015)
Economic Modelling
, vol.51
, Issue.C
, pp. 328-339
-
-
Barañano, I.1
-
36
-
-
73849140062
-
A trust system architecture for SCADA network security
-
Coates, G.M., Hopkinson, K.M., Graham, S.R., Kurkowski, S.H. A trust system architecture for SCADA network security. Power Delivery, IEEE Transactions on 2010;25(1):158-169.
-
(2010)
Power Delivery, IEEE Transactions on
, vol.25
, Issue.1
, pp. 158-169
-
-
Coates, G.M.1
Hopkinson, K.M.2
Graham, S.R.3
Kurkowski, S.H.4
-
37
-
-
84866345800
-
LiveSec: Towards effective security management in large-scale production networks
-
IEEE
-
Wang, K., Qi, Y., Yang, B., Xue, Y., Li, J. LiveSec: Towards effective security management in large-scale production networks. In: Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on. IEEE; 2012, p. 451-460.
-
(2012)
Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on
, pp. 451-460
-
-
Wang, K.1
Qi, Y.2
Yang, B.3
Xue, Y.4
Li, J.5
-
38
-
-
79960807470
-
Netsecu: A collaborative network security platform for in-network security
-
IEEE
-
Chen, X., Mu, B., Chen, Z. Netsecu: A collaborative network security platform for in-network security. In: Communications and Mobile Computing (CMC), 2011 Third International Conference on. IEEE; 2011, p. 59-64.
-
(2011)
Communications and Mobile Computing (CMC), 2011 Third International Conference on
, pp. 59-64
-
-
Chen, X.1
Mu, B.2
Chen, Z.3
-
39
-
-
84992574884
-
Network attack detection and defense: Securing industrial control systems for critical infrastructures (dagstuhl seminar 14292)
-
Dacier, M., Kargl, F., König, H., Valdes, A. Network attack detection and defense: Securing industrial control systems for critical infrastructures (dagstuhl seminar 14292). Dagstuhl Reports 2014; 4(7).
-
(2014)
Dagstuhl Reports
, vol.4
, Issue.7
-
-
Dacier, M.1
-
40
-
-
49949112244
-
Uncover security design flaws using the STRIDE approach
-
Hernan, S., Lambert, S., Ostwald, T., Shostack, A. Uncover security design flaws using the STRIDE approach. MSDN Magazine 2006;URL: http://msdn.microsoft.com/en-us/magazine/cc163519.aspx.
-
(2006)
MSDN Magazine
-
-
Hernan, S.1
Lambert, S.2
Ostwald, T.3
Shostack, A.4
-
41
-
-
84906950333
-
Empirical evaluation of a privacy- focused threat modeling methodology
-
Wuyts, K., Scandariato, R., Joosen, W. Empirical evaluation of a privacy- focused threat modeling methodology. Journal of Systems and Software 2014;96:122-138. doi:http://dx.doi.org/10.1016/j.jss.2014.05.075.
-
(2014)
Journal of Systems and Software
, vol.96
, pp. 122-138
-
-
Wuyts, K.1
Scandariato, R.2
Joosen, W.3
-
42
-
-
84881430182
-
An autonomous framework for supporting energy efficiency and communication reliability in wsns
-
IEEE
-
Khader, O., Willig, A., Wolisz, A. An autonomous framework for supporting energy efficiency and communication reliability in wsns. In: Wireless and Mobile Networking Conference (WMNC), 2013 6th Joint IFIP. IEEE; 2013, p. 1-8.
-
(2013)
Wireless and Mobile Networking Conference (WMNC), 2013 6th Joint IFIP
, pp. 1-8
-
-
Khader, O.1
Willig, A.2
Wolisz, A.3
-
43
-
-
84883404317
-
Self-organizing WSN protocol for real-time communication requirements
-
IEEE
-
Sallai, J., Horváth, P., Koutsoukos, X. Self-organizing wsn protocol for real-time communication requirements. In: Distributed Computing in Sensor Systems (DCOSS), 2013 IEEE International Conference on. IEEE; 2013, p. 409-414.
-
(2013)
Distributed Computing in Sensor Systems (DCOSS), 2013 IEEE International Conference on
, pp. 409-414
-
-
Sallai, J.1
-
44
-
-
84969831650
-
A security survey of middleware for the Internet of Things
-
Fremantle, P., Scott, P. A security survey of middleware for the Internet of Things. PeerJ PrePrints 2015;3:e1521.
-
(2015)
PeerJ PrePrints
, vol.3
, pp. e1521
-
-
Fremantle, P.1
Scott, P.2
-
45
-
-
84959017815
-
AST: Activity-security-trust driven modeling of time varying networks
-
Wang, J., Xu, J., Liu, Y., Deng, W. AST: Activity-security-trust. driven modeling of time varying networks. Scientific reports 2016;6. doi:doi:10.1038/srep21352.
-
(2016)
Scientific Reports
, pp. 6
-
-
Wang, J.1
Xu, J.2
Liu, Y.3
Deng, W.4
-
46
-
-
84867824901
-
The VIRTUS middleware: An XMPP based architecture for secure IoT communications
-
Conzon, D., Bolognesi, T., Brizzi, P., Lotito, A., Tomasi, R., Spirito, M.A. The VIRTUS middleware: An XMPP based architecture for secure IoT communications. In: 2012 21st International Conference on Computer Communications and Networks (ICCCN). 2012, p. 1-6. doi:10.1109/ICCCN. 2012.6289309.
-
(2012)
2012 21st International Conference on Computer Communications and Networks (ICCCN)
, pp. 1-6
-
-
Conzon, D.1
Bolognesi, T.2
Brizzi, P.3
Lotito, A.4
Tomasi, R.5
Spirito, M.A.6
-
47
-
-
84926463330
-
Game theory meets information security management
-
Springer
-
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C., Smeraldi, F. Game theory meets information security management. In: ICT Systems Security and Privacy Protection. Springer; 2014, p. 15-29.
-
(2014)
ICT Systems Security and Privacy Protection
, pp. 15-29
-
-
Fielder, A.1
Panaousis, E.2
Malacaria, P.3
Hankin, C.4
Smeraldi, F.5
-
48
-
-
84885184956
-
A game theoretic defence framework against dos/ddos cyber attacks
-
Spyridopoulos, T., Karanikas, G., Tryfonas, T., Oikonomou, G. A game theoretic defence framework against dos/ddos cyber attacks. Computers & Security 2013;38:39-50.
-
(2013)
Computers & Security
, vol.38
, pp. 39-50
-
-
Spyridopoulos, T.1
Karanikas, G.2
Tryfonas, T.3
Oikonomou, G.4
-
49
-
-
84913580411
-
Scalable risk assessment method for cloud computing using game theory (ccram)
-
Furuncu, E., Sogukpinar, I. Scalable risk assessment method for cloud computing using game theory (ccram). Computer Standards & Interfaces 2015;38:44-50.
-
(2015)
Computer Standards & Interfaces
, vol.38
, pp. 44-50
-
-
Furuncu, E.1
Sogukpinar, I.2
-
50
-
-
84957026225
-
Methods on determining the investment in IT security
-
Nemati, H.R., editor IGI Global
-
Eisenga, A., Rodriguez, W., Jones, T. Methods on determining the investment in IT security. In: Nemati, H.R., editor. Advances in Information Security, Privacy, and Ethics: Analyzing Security, Trust, and Crime in the Digital World. IGI Global. ISBN 9781466648579; 2013, p. 22-34. doi:10.4018/978-1-4666-4856-2.ch002.
-
(2013)
Advances in Information Security, Privacy, and Ethics: Analyzing Security, Trust, and Crime in the Digital World
, pp. 22-34
-
-
Eisenga, A.1
Rodriguez, W.2
Jones, T.3
-
51
-
-
84901721702
-
Cyber supply chain security practices DNA - Filling in the puzzle using a diverse set of disciplines
-
special Issue on Security in the Cyber Supply Chain.
-
Bartol, N. Cyber supply chain security practices DNA - filling in the puzzle using a diverse set of disciplines. Technovation 2014;34(7):354-361. doi:http://dx.doi.org/10.1016/j.technovation.2014.01.005; special Issue on Security in the Cyber Supply Chain.
-
(2014)
Technovation
, vol.34
, Issue.7
, pp. 354-361
-
-
Bartol, N.1
-
52
-
-
84891959392
-
Detection and mitigation of sinkhole attacks in wireless sensor networks
-
special Issue on Wireless Network Intrusion.
-
Shafiei, H., Khonsari, A., Derakhshi, H., Mousavi, P. Detection and mitigation of sinkhole attacks in wireless sensor networks. Journal of Computer and System Sciences 2014;80(3):644-653. doi:http://dx.doi.org/10.1016/j.jcss.2013.06.016; special Issue on Wireless Network Intrusion.
-
(2014)
Journal of Computer and System Sciences
, vol.80
, Issue.3
, pp. 644-653
-
-
Shafiei, H.1
Khonsari, A.2
Derakhshi, H.3
Mousavi, P.4
-
53
-
-
84906875859
-
-
New Delhi: Springer India
-
Sahu, S.S., Pandey, M. Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014, Volume 2; chap. A Probabilistic Packet Filtering-Based Approach for Distributed Denial of Service Attack in Wireless Sensor Network. New Delhi: Springer India. ISBN 978-81-322-2009-1; 2015, p. 65-70.
-
(2015)
Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014, Volume 2; Chap. A Probabilistic Packet Filtering-Based Approach for Distributed Denial of Service Attack in Wireless Sensor Network
, pp. 65-70
-
-
Sahu, S.S.1
Pandey, M.2
-
55
-
-
84868557944
-
Smatt: Smart meter attestation using multiple target selection and copy-proof memory
-
Springer
-
Park, H., Seo, D., Lee, H., Perrig, A. Smatt: Smart meter attestation using multiple target selection and copy-proof memory. In: Computer Science and its Applications. Springer; 2012, p. 875-887.
-
(2012)
Computer Science and Its Applications
, pp. 875-887
-
-
Park, H.1
Seo, D.2
Lee, H.3
Perrig, A.4
-
56
-
-
84890860713
-
Information sharing and collaborative behaviors in enabling supply chain performance: A social exchange perspective
-
Wu, L., Chuang, C.H., Hsu, C.H. Information sharing and collaborative behaviors in enabling supply chain performance: A social exchange perspective. International Journal of Production Economics 2014;148:122-132.
-
(2014)
International Journal of Production Economics
, vol.148
, pp. 122-132
-
-
Wu, L.1
Chuang, C.H.2
Hsu, C.H.3
-
57
-
-
80055061655
-
Supply chain integration and performance: The effects of long-term relationships, information technology and sharing, and logistics integration
-
Prajogo, D., Olhager, J. Supply chain integration and performance: The effects of long-term relationships, information technology and sharing, and logistics integration. International Journal of Production Economics 2012;135(1):514-522.
-
(2012)
International Journal of Production Economics
, vol.135
, Issue.1
, pp. 514-522
-
-
Prajogo, D.1
Olhager, J.2
-
58
-
-
84961696236
-
Cyber-investment and cyber-information exchange decision modeling
-
IEEE
-
Tosh, D.K., Molloy, M., Sengupta, S., Kamhoua, C.A., Kwiat, K.A. Cyber-investment and cyber-information exchange decision modeling. In: High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on. IEEE; 2015, p. 1219-1224.
-
(2015)
High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on
, pp. 1219-1224
-
-
Tosh, D.K.1
Molloy, M.2
Sengupta, S.3
Kamhoua, C.A.4
Kwiat, K.A.5
-
59
-
-
84953745168
-
An evolutionary game-theoretic framework for cyber-threat information sharing
-
IEEE
-
Tosh, D., Sengupta, S., Kamhoua, C., Kwiat, K., Martin, A. An evolutionary game-theoretic framework for cyber-threat information sharing. In: Communications (ICC), 2015 IEEE International Conference on. IEEE; 2015, p. 7341-7346.
-
(2015)
Communications (ICC), 2015 IEEE International Conference on
, pp. 7341-7346
-
-
Tosh, D.1
Sengupta, S.2
Kamhoua, C.3
Kwiat, K.4
Martin, A.5
|