Cyber security risk assessment method for SCADA system (Unknown)
- New search for: Hossain, Nazmul
- New search for: Das, Taposh
- New search for: Islam, Tariqul
- New search for: Alam Hossain, Md
- New search for: Hossain, Nazmul
- New search for: Das, Taposh
- New search for: Islam, Tariqul
- New search for: Alam Hossain, Md
In:
Information Security Journal: A Global Perspective
;
31
, 5
;
499-510
;
2022
- Article (Journal) / Electronic Resource
-
Title:Cyber security risk assessment method for SCADA system
-
Contributors:Hossain, Nazmul ( author ) / Das, Taposh ( author ) / Islam, Tariqul ( author ) / Alam Hossain, Md ( author )
-
Published in:Information Security Journal: A Global Perspective ; 31, 5 ; 499-510
-
Publisher:
- New search for: Taylor & Francis
-
Publication date:2022-09-03
-
Size:12 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:Unknown
-
Keywords:
-
Source:
Table of contents – Volume 31, Issue 5
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 499
-
Cyber security risk assessment method for SCADA systemHossain, Nazmul / Das, Taposh / Islam, Tariqul / Alam Hossain, Md et al. | 2022
- 511
-
A tokenization technique for improving the security of EMV contactless cardsAl-Maliki, Ossama / Al-Assam, Hisham et al. | 2022
- 527
-
A new DCT based robust image watermarking scheme using cellular automataJana, Manasi / Jana, Biswapati et al. | 2022
- 544
-
Benchmarking full version of GureKDDCup, UNSW-NB15, and CIDDS-001 NIDS datasets using rolling-origin resamplingChew, Yee Jian / Lee, Nicholas / Ooi, Shih Yin / Wong, Kok-Seng / Pang, Ying Han et al. | 2022
- 566
-
IoT privacy preservation using blockchainPatel, Chintan et al. | 2022
- 582
-
Optimized generative adversarial network with fractional calculus based feature fusion using Twitter stream for spam detectionB, Venkateswarlu / V, Viswanath Shenoi et al. | 2022
- 602
-
A primer on insider threats in cybersecurityPrabhu, Sunitha / Thompson, Nik et al. | 2022
- 612
-
PAC: Privacy preserving proxy re-encryption for access control in public cloudChaudhari, Payal / Das, Manik Lal et al. | 2022