2013
DOI: 10.3390/fi5020205
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Cyber Threats and Defence Approaches in Emergency Management

Abstract: Emergency planners, first responders and relief workers increasingly rely on computational and communication systems that support all aspects of emergency management, from mitigation and preparedness to response and recovery. Failure of these systems, whether accidental or because of malicious action, can have severe implications for emergency management. Accidental failures have been extensively documented in the past and significant effort has been put into the development and introduction of more resilient … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0
1

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 31 publications
(15 citation statements)
references
References 86 publications
0
14
0
1
Order By: Relevance
“…Further, false/malicious data can be injected into the network over those fake nodes. Therefore, confidentiality of data circulation needs to be retained in a reasonable degree [103].…”
Section: Cps Challengesmentioning
confidence: 99%
“…Further, false/malicious data can be injected into the network over those fake nodes. Therefore, confidentiality of data circulation needs to be retained in a reasonable degree [103].…”
Section: Cps Challengesmentioning
confidence: 99%
“…The decreasing cost of complex embedded electronics is ensuring that embedded technology is finding its way into all kinds of everyday products helping realizing a vision of CPS with virtually endless benefits [6] [7]. CPS are already widely being used in utility networks, transportation systems, entertainment business and in a number of industries including healthcare, manufacturing, and services [8].…”
Section: Introductionmentioning
confidence: 99%
“…Under emergency situations, HMTs are forced to make decisions within tight time schedules often with incomplete information, while the new situational complexity is likely to overload team cognitive resources [25]. In military unmanned systems, a failure to first-respond to the emergency situations can result in catastrophic damages, and there are growing concerns over the potential of cyber threats to impede the timely responses [26].…”
Section: Introductionmentioning
confidence: 99%