Blar i Øvrige samlinger på tittel
Viser treff 7773-7792 av 39326
-
CybAllaince WP3 Report Joint Supervision, and Guest Tutorials Report 2023
(Research report, 2023) -
Cyber Attacks for Sale
(Chapter, 2020)The infamous darknet hosts an underground economy for illegal goods and services, some of which can be purchased and used for cyber attacks. By analyzing the properties and popularity of such items, we can get indications ... -
Cyber Physical Defense Framework for Distributed Smart Grid Applications
(Journal article; Peer reviewed, 2021) -
Cyber Ranges and Security Testbeds: Scenarios, Functions, Tools and Architecture
(Journal article; Peer reviewed, 2019)The first line of defense against cyber threats and cyber crimes is to be aware and get ready, e.g., through cyber security training. Training can have two forms, the first is directed towards security professionals and ... -
Cyber Risk Assessment For Ships (CRASH)
(Peer reviewed; Journal article, 2023) -
Cyber Risk Assessment for SHips (CRASH)
(Peer reviewed; Journal article, 2024)The maritime industry is undergoing a digital transformation, with an increasing integration of Information Technology (IT) and Operational Technology (OT) systems on modern vessels. Its multiple benefits notwithstanding, ... -
Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth
(Peer reviewed; Journal article, 2022)Recent innovations in the smart city domain have led to the proposition of a new mode of transportation utilizing Autonomous Passenger Ships (APS) or ferries in inland waterways. The novelty of the APS concept influenced ... -
Cyber Risk Perception in the Maritime Domain: A Systematic Literature Review
(Peer reviewed; Journal article, 2021)This paper aims to present an approach to investigate cyber risk perception with use of recognized psychological models, and to give an overview of state-of-the-art research within the field of cyber risk perception in ... -
Cyber Risk Propagation and Optimal Selection of Cybersecurity Controls for Complex Cyberphysical Systems
(Peer reviewed; Journal article, 2021)The increasingly witnessed integration of information technology with operational technology leads to the formation of Cyber-Physical Systems (CPSs) that intertwine physical and cyber components and connect to each other ... -
Cyber security awareness and culture in rural Norway
(Research report, 2018)Understanding the level of security awareness, the perception, and the culture of users in aspects related to security, is crucial for the development of suitable measures towards their protection and the protection of the ... -
Cyber security culture as a resilience-promoting factor for human-centered Machine Learning and Zero-defect Manufacturing environments
(Peer reviewed; Journal article, 2023)Humans have often been perceived as a leading cause of error in Zero-defect manufacturing (ZDM) processes. There is thus a reduction of human interventions in the deployment of industry 4.0 (I4.0) technologies used for ZDM ... -
Cyber security education for children through gamification: research plan and perspectives
(Chapter, 2020)With the advancement of technology and the development of new tools, games, applications and social media sites, it is getting difficult every day to keep up with threats and vulnerabilities associated with these tools, ... -
Cyber Security Issues in Navigation Systems of Marine Vessels From Control Perspective
(Chapter, 2017)Autonomous marine vessels are the way forward to revolutionize maritime operations. However, the safety and success of autonomous missions depend critically on the availability of a reliable positioning system and time ... -
Cyber security risk assessment of a DDoS attack
(Journal article; Peer reviewed, 2016)This paper proposes a risk assessment process based on distinct classes and estimators, which we apply to a case study of a common communications security risk; a distributed denial of service attack (DDoS) attack. The ... -
Cyber Security Training for Critical Infrastructure Protection: a Literature Review
(Peer reviewed; Journal article, 2021)Introduction: Today, cyber-security curricula are available across educational types and levels, including a vast array of programs and modules tailored to specific sectors of industry and audiences, to allow more targeted ... -
Cyber Trust in the Norwegian Online Flea Market: An Ethnographic Study on Fraud
(Chapter, 2020)This work-in-progress paper reports an ethnographic study on how cyber trust could be designed to prevent online fraud. A yearlong ethnographic study was conducted with a group of victims who were scammed in online shopping. ... -
Cyber Weapons Storage Mechanisms
(Journal article; Peer reviewed, 2019)In this paper, the current status of the art of cyber weapon storage methods and related processes are reviewed with particular reference to the safe guards present in storage of cyber weapons and contingency planning in ... -
Cyber-Attacks Against the Autonomous Ship
(Chapter, 2019)Autonomous ships transferring valuable cargoes and humans in a more efficient and cost effective manner will soon be state of the art technology. Yet, their ICT system architecture and operations have not been defined in ... -
Cyber-conformity and safety: the groupthink dilemma
(Journal article; Peer reviewed, 2017)The 'capable group' is part of the ethos in resilience-based safety management. Group ideas draw upon psychology. But, what if the psychological blueprints no longer apply? My thesis is that we are changed by cyber-conformity: ... -
Cyber-physical Hardening of the DigitalWater Infrastructure
(Chapter, 2023)Water supply and drainage systems, which are categorized as critical infrastructure, serve a crucial role in preserving societal health and well-being. Since climate change effects, harsher regulations, population changes, ...