Now showing items 7482-7501 of 37292

    • Cyber Risk Propagation and Optimal Selection of Cybersecurity Controls for Complex Cyberphysical Systems 

      Kavallieratos, Georgios; Spathoulas, Georgios; Katsikas, Sokratis (Peer reviewed; Journal article, 2021)
      The increasingly witnessed integration of information technology with operational technology leads to the formation of Cyber-Physical Systems (CPSs) that intertwine physical and cyber components and connect to each other ...
    • Cyber security awareness and culture in rural Norway 

      Gunleifsen, Håkon (Research report, 2018)
      Understanding the level of security awareness, the perception, and the culture of users in aspects related to security, is crucial for the development of suitable measures towards their protection and the protection of the ...
    • Cyber security culture as a resilience-promoting factor for human-centered Machine Learning and Zero-defect Manufacturing environments 

      Mitcheltree, Christina Marie; Mugurusi, Godfrey; Holtskog, Halvor (Peer reviewed; Journal article, 2023)
      Humans have often been perceived as a leading cause of error in Zero-defect manufacturing (ZDM) processes. There is thus a reduction of human interventions in the deployment of industry 4.0 (I4.0) technologies used for ZDM ...
    • Cyber security education for children through gamification: research plan and perspectives 

      Quayyum, Farzana (Chapter, 2020)
      With the advancement of technology and the development of new tools, games, applications and social media sites, it is getting difficult every day to keep up with threats and vulnerabilities associated with these tools, ...
    • Cyber Security Issues in Navigation Systems of Marine Vessels From Control Perspective 

      Hassani, Vahid; Crasta, Naveena; Pascoal, Antonio (Chapter, 2017)
      Autonomous marine vessels are the way forward to revolutionize maritime operations. However, the safety and success of autonomous missions depend critically on the availability of a reliable positioning system and time ...
    • Cyber security risk assessment of a DDoS attack 

      Wangen, Gaute; Shalaginov, Andrii; Hallstensen, Christoffer V (Journal article; Peer reviewed, 2016)
      This paper proposes a risk assessment process based on distinct classes and estimators, which we apply to a case study of a common communications security risk; a distributed denial of service attack (DDoS) attack. The ...
    • Cyber Security Training for Critical Infrastructure Protection: a Literature Review 

      Chowdhury, Nabin; Gkioulos, Vasileios (Peer reviewed; Journal article, 2021)
      Introduction: Today, cyber-security curricula are available across educational types and levels, including a vast array of programs and modules tailored to specific sectors of industry and audiences, to allow more targeted ...
    • Cyber Trust in the Norwegian Online Flea Market: An Ethnographic Study on Fraud 

      Pan, Yushan (Chapter, 2020)
      This work-in-progress paper reports an ethnographic study on how cyber trust could be designed to prevent online fraud. A yearlong ethnographic study was conducted with a group of victims who were scammed in online shopping. ...
    • Cyber Weapons Storage Mechanisms 

      Yamin, Muhammad Mudassar; Katt, Basel; Kianpour, Mazaher (Journal article; Peer reviewed, 2019)
      In this paper, the current status of the art of cyber weapon storage methods and related processes are reviewed with particular reference to the safe guards present in storage of cyber weapons and contingency planning in ...
    • Cyber-Attacks Against the Autonomous Ship 

      Kavallieratos, Georgios; Katsikas, Sokratis; Gkioulos, Vasileios (Chapter, 2019)
      Autonomous ships transferring valuable cargoes and humans in a more efficient and cost effective manner will soon be state of the art technology. Yet, their ICT system architecture and operations have not been defined in ...
    • Cyber-conformity and safety: the groupthink dilemma 

      Størseth, Fred (Journal article; Peer reviewed, 2017)
      The 'capable group' is part of the ethos in resilience-based safety management. Group ideas draw upon psychology. But, what if the psychological blueprints no longer apply? My thesis is that we are changed by cyber-conformity: ...
    • Cyber-physical Hardening of the DigitalWater Infrastructure 

      Cali, Umit; Catak, Ferhat Özgur; Balogh, Zsolt György; Ugarelli, Rita Maria; Jaatun, Martin Gilje (Chapter, 2023)
      Water supply and drainage systems, which are categorized as critical infrastructure, serve a crucial role in preserving societal health and well-being. Since climate change effects, harsher regulations, population changes, ...
    • Cyber-Physical Waste Identification and Elimination Strategies in the Digital Lean Manufacturing World 

      Romero, David; Gaiardelli, Paolo; Thürer, Matthias; Powell, Daryl; Wuest, Thorsten (Peer reviewed; Journal article, 2019)
      Lean Manufacturing and Industry 4.0 are at times portrait as conflicting paradigms. However, we take the stance that they are two sides of the same coin, and should be considered as mutually beneficial. Based on this ...
    • Cyber-Security Assessment of Power System Digital Components in the Conditions of Hostilities 

      Mishchenko, Denys; Oleinikova, Irina; Ivanko, Dmytro (Chapter, 2023)
      Emergencies, including hostilities, create additional cyber-physical security (CPS) challenges for the operation of digital power system components. This paper showcases the main problems faced by one of the components of ...
    • Cyber-Security Gaps in a Digital Substation: From Sensors to SCADA 

      Khodabakhsh, Athar; Yildirim Yayilgan, Sule; Houmb, Siv Hilde; Hurzuk, Nargis; Foros, Jørn; Istad, Maren Kristine (Chapter, 2020)
      Development of digital substations provides power industrial operation, real-time functionalities and information access. A main challenge in DS is to ensure security, availability, and reliability of power systems as in ...
    • CyberAIMs: A tool for teaching adversarial and systems thinking 

      Zoto, Erjon; Kowalski, Stewart James; Katt, Basel; Frantz, Christopher; Lopez Rojas, Edgar Alonso (Chapter, 2018)
      CyberAIMs stands for Cyber Agents’ Interactive Modeling and Simulation. We designed this tool in order to use it as an educational tool to teach Master students in a Cyber security course. This paper aims to describe the ...
    • CyberEscape Approach to Advancing Hard and Soft Skills in Cybersecurity Education 

      Pirta-Dreimane, Rūta; Brilingaite, A.; Roponena, Evita; Parish, Karen; Grabis, Janis; Lugo, Ricardo Gregorio; Bonders, Martins (Peer reviewed; Journal article, 2023)
      Incorporating gamification elements and innovative approaches in training and educational programs are promising for addressing cybersecurity knowledge gaps. Cybersecurity training should consider a combination of hard and ...
    • Cybergenomics: Application of behavioral genetics in cybersecurity 

      Domarkiene, Ingrida; Ambrozaitytė, Laima; Bukauskas, Linas; Rančelis, Tautvydas; Sütterlin, Stefan; Knox, Benjamin James; Maennel, Kaie; Maennel, Olaf; Parish, Karen; Lugo, Ricardo Gregorio; Brilingaitė, Agne (Peer reviewed; Journal article, 2021)
      Cybersecurity (CS) is a contemporary field for research and applied study of a range of aspects from across multiple disciplines. A cybersecurity expert has an in-depth knowledge of technology but is often also recognized ...
    • Cybersecurity and Safety Co-Engineering of Cyberphysical Systems—A Comprehensive Survey 

      Kavallieratos, Georgios; Katsikas, Sokratis; Gkioulos, Vasileios (Peer reviewed; Journal article, 2020)
      Safeguarding both safety and cybersecurity is paramount to the smooth and trustworthy operation of contemporary cyber physical systems, many of which support critical functions and services. As safety and security have ...
    • Cybersecurity awareness for children: A systematic literature review 

      Quayyum, Farzana; Cruzes, Daniela Soares; Jaccheri, Maria Letizia (Peer reviewed; Journal article, 2021)
      Cybersecurity for children has received much attention and has become a rapidly growing topic due to the increased availability of the internet to children and their consequent exposure to various online risks. This paper ...