2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) 2022
DOI: 10.1109/hora55278.2022.9799957
|View full text |Cite
|
Sign up to set email alerts
|

Socio-Cyber-Physical Systems Security Concept

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…To build multi-contour security systems, let's use a threat classifier that takes into account hybridity, synergy and integration of mixed threats with social engineering methods. The practical implementation of the classifier is given in the resource [39], the main stages of the formation of a multi-contour information security system for socio-cyberphysical systems [6,40,41].…”
Section: Materials and Research Methodsmentioning
confidence: 99%
“…To build multi-contour security systems, let's use a threat classifier that takes into account hybridity, synergy and integration of mixed threats with social engineering methods. The practical implementation of the classifier is given in the resource [39], the main stages of the formation of a multi-contour information security system for socio-cyberphysical systems [6,40,41].…”
Section: Materials and Research Methodsmentioning
confidence: 99%
“…The development of means of information influence in the technical sphere [3,4] leads to significant complications in the use of widespread technical means of control and communication. At the same time, the use of existing hardware and software becomes virtually impossible [5][6][7][8][9], which becomes a significant problem of ensuring the required level of security in cyberspace, in particular when using wireless mobile data transmission channels.…”
Section: Introductionmentioning
confidence: 99%