断言 发表于 2025-3-28 16:59:02

Securing Software Updates for TrainsTesting and validation phase, additional manual approval procedure and update progress control are integrated into the Uptane framework in order to conform to the railway safety requirements and norms. The possible metadata and repository customization is proposed and specific railway update attacks are discussed.

dermatomyositis 发表于 2025-3-28 21:45:21

http://reply.papertrans.cn/24/2400/239972/239972_42.png

带来的感觉 发表于 2025-3-29 00:16:11

http://reply.papertrans.cn/24/2400/239972/239972_43.png

两种语言 发表于 2025-3-29 05:52:44

http://reply.papertrans.cn/24/2400/239972/239972_44.png

简洁 发表于 2025-3-29 07:51:24

http://reply.papertrans.cn/24/2400/239972/239972_45.png

Pandemic 发表于 2025-3-29 14:33:34

https://doi.org/10.1007/978-3-662-36616-5Testing and validation phase, additional manual approval procedure and update progress control are integrated into the Uptane framework in order to conform to the railway safety requirements and norms. The possible metadata and repository customization is proposed and specific railway update attacks are discussed.

唠叨 发表于 2025-3-29 19:33:20

Everything Is Awesome! or Is It? Cyber Security Risks in Critical Infrastructurend electricity. Recent years have seen a number of high profile cyber attacks on such infrastructure exemplified by Stuxnet and the Ukrainian Power Grid attacks. This naturally begs the question: how should we manage cyber security risks in such infrastructure on which the day-to-day functioning of

Substitution 发表于 2025-3-29 20:52:08

http://reply.papertrans.cn/24/2400/239972/239972_48.png

Expand 发表于 2025-3-30 02:48:13

Exploring How Component Factors and Their Uncertainty Affect Judgements of Risk in Cyber-Securitye, the vulnerability of individual system components can be described using multiple factors, such as complexity, technological maturity, and the availability of tools to aid an attack. Such information is useful for determining attack risk, but much of it is challenging to acquire automatically and

储备 发表于 2025-3-30 04:13:07

Estimating Cascading Effects in Cyber-Physical Critical Infrastructuresading effects throughout the entire infrastructure, which need to be identified and estimated to realize a proper risk management. In this paper, we present a formal model to describe the propagation of a threat through the various physical and cyber assets within a critical infrastructure and the c
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Critical Information Infrastructures Security; 14th International C Simin Nadjm-Tehrani Conference proceedings 2020 Springer Nature Switzer