Search "cyber security threats"

Probst, Christian W. - Insider Threats in Cyber Security, ebook

Insider Threats in Cyber Security

Probst, Christian W.


Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation
Frank L. Greitzer, Deborah A. Frincke
6. A Risk Management Approach to the “Insider Threat”

Kumar, Vipin - Managing Cyber Threats, ebook

Managing Cyber Threats

Kumar, Vipin


Managing Threats to Web Databases and Cyber Systems
Bhavani Thuraisingham
2. Intrusion Detection: A Survey
Aleksandar Lazarevic, Vipin Kumar, Jaideep Srivastava
Part II. Data Mining Based Analysis of Computer Attacks
3. Learning Rules and Clusters

Clark, Robert M. - Cyber-Physical Security, ebook

Cyber-Physical Security

Clark, Robert M.


Assessing Cyber Threats and Solutions for Municipalities
Scott J. White
4. Cyber Perimeters for Critical Infrastructures
A. F. Ginter
5. A Security Evaluation of a Municipal Computer Network: The Case of Collaboration

Moeller, Robert R. - Cyber Security and Privacy Control, ebook

Cyber Security and Privacy Control

Moeller, Robert R.


IT audit functions sometimes fail to implement appropriate security and privacy protection controls over their own IT audit processes, such as audit evidence materials, IT audit workpapers, auditor laptop computer resources, and many others. Although every audit department

Bellovin, Steven M. - Insider Attack and Cyber Security, ebook

Insider Attack and Cyber Security

Bellovin, Steven M.


Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach
Ravishankar K. Iyer, Paul Dabrowski, Nithin Nakka, Zbigniew Kalbarczyk
9. Surviving Insider Attacks: A Call for System Experiments
Virgil D. Gligor, C.

Lin, Chung-Wei - Security-Aware Design for Cyber-Physical Systems, ebook

Security-Aware Design for Cyber-Physical Systems

Lin, Chung-Wei


Table of contents
1. Introduction
Chung-Wei Lin, Alberto Sangiovanni-Vincentelli
2. Security Threats in Cyber-Physical Systems
Chung-Wei Lin, Alberto Sangiovanni-Vincentelli
3. Security-Aware Design Methodology
Chung-Wei Lin, Alberto Sangiovanni-Vincentelli
4. Security Mechanisms for CAN Protocol