Emergency Management 2012
DOI: 10.5772/34104
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security Concerns for Emergency Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 42 publications
(24 reference statements)
0
1
0
Order By: Relevance
“…Thus, the proposed classifier takes into account the signs of synergy and hybridity of targeted attacks, as well as the possibility of combining with threats based on social engineering methods. This approach differs from well-known approaches [52,[56][57][58][59][60][61][62][63][64] by the ability to take into account the entire variety of targeted attacks combined with threats based on social engineering methods, considering the signs of synergy and hybridity.…”
Section: Discussion Of the Results Of Creating A Multi-loop Security ...mentioning
confidence: 99%
“…Thus, the proposed classifier takes into account the signs of synergy and hybridity of targeted attacks, as well as the possibility of combining with threats based on social engineering methods. This approach differs from well-known approaches [52,[56][57][58][59][60][61][62][63][64] by the ability to take into account the entire variety of targeted attacks combined with threats based on social engineering methods, considering the signs of synergy and hybridity.…”
Section: Discussion Of the Results Of Creating A Multi-loop Security ...mentioning
confidence: 99%
“…Supervisory control and data acquisition systems (SCADA) are an integral part of modern industrial infrastructure. Unsurprisingly, vulnerabilities in this management network remain an attractive place for cyber attacks that continue to grow due to SCADA systems connected to the Internet [15]. A feature of the analyzed work is not only the classification of attacks, but also its connection with security standards.…”
Section: Fig 1 Relationship Of Ccis With Cpsmentioning
confidence: 99%