断言 发表于 2025-3-28 16:59:02
Securing Software Updates for TrainsTesting and validation phase, additional manual approval procedure and update progress control are integrated into the Uptane framework in order to conform to the railway safety requirements and norms. The possible metadata and repository customization is proposed and specific railway update attacks are discussed.dermatomyositis 发表于 2025-3-28 21:45:21
http://reply.papertrans.cn/24/2400/239972/239972_42.png带来的感觉 发表于 2025-3-29 00:16:11
http://reply.papertrans.cn/24/2400/239972/239972_43.png两种语言 发表于 2025-3-29 05:52:44
http://reply.papertrans.cn/24/2400/239972/239972_44.png简洁 发表于 2025-3-29 07:51:24
http://reply.papertrans.cn/24/2400/239972/239972_45.pngPandemic 发表于 2025-3-29 14:33:34
https://doi.org/10.1007/978-3-662-36616-5Testing and validation phase, additional manual approval procedure and update progress control are integrated into the Uptane framework in order to conform to the railway safety requirements and norms. The possible metadata and repository customization is proposed and specific railway update attacks are discussed.唠叨 发表于 2025-3-29 19:33:20
Everything Is Awesome! or Is It? Cyber Security Risks in Critical Infrastructurend electricity. Recent years have seen a number of high profile cyber attacks on such infrastructure exemplified by Stuxnet and the Ukrainian Power Grid attacks. This naturally begs the question: how should we manage cyber security risks in such infrastructure on which the day-to-day functioning ofSubstitution 发表于 2025-3-29 20:52:08
http://reply.papertrans.cn/24/2400/239972/239972_48.pngExpand 发表于 2025-3-30 02:48:13
Exploring How Component Factors and Their Uncertainty Affect Judgements of Risk in Cyber-Securitye, the vulnerability of individual system components can be described using multiple factors, such as complexity, technological maturity, and the availability of tools to aid an attack. Such information is useful for determining attack risk, but much of it is challenging to acquire automatically and储备 发表于 2025-3-30 04:13:07
Estimating Cascading Effects in Cyber-Physical Critical Infrastructuresading effects throughout the entire infrastructure, which need to be identified and estimated to realize a proper risk management. In this paper, we present a formal model to describe the propagation of a threat through the various physical and cyber assets within a critical infrastructure and the c