Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] When shutdown is no option: Identifying the notion of the digital government continuity paradox in Estonia's eID crisis
I Skierka - Government Information Quarterly, 2023 - Elsevier
States must increasingly manage cybersecurity threats and disruptions in their digital
government infrastructures. However, the digital government literature lacks a systematic …
government infrastructures. However, the digital government literature lacks a systematic …
The evolution of the Human Systems and Simulation Laboratory in nuclear power research
Abstract The events at Three Mile Island in the United States brought about fundamental
changes in the ways that simulation would be used in nuclear operations. The need for …
changes in the ways that simulation would be used in nuclear operations. The need for …
Winning the battle with cyber risk identification tools in industrial control systems: A review
Abstract The modern Industrial Control System (ICS) environment now combines information
technology (IT), operational technology, and physical processes. This digital transformation …
technology (IT), operational technology, and physical processes. This digital transformation …
Towards a new taxonomy of insider threats
This paper discusses the outcome of combining insider threat agent taxonomies with the aim
of enhancing insider threat detection. The objectives sought to explore taxonomy …
of enhancing insider threat detection. The objectives sought to explore taxonomy …
Requirements Analysis for the Evaluation of Automated Security Risk Assessments
The overall Industry 4.0 developments and the highly dynamic threat landscape enhance
the need for continuous security engineering of industrial components, modules, and …
the need for continuous security engineering of industrial components, modules, and …
[HTML][HTML] Development of the framework for quantitative cyber risk assessment in nuclear facilities
KS Son, JG Song, JW Lee - Nuclear Engineering and Technology, 2023 - Elsevier
Industrial control systems in nuclear facilities are facing increasing cyber threats due to the
widespread use of information and communication equipment. To implement cyber security …
widespread use of information and communication equipment. To implement cyber security …
[PDF][PDF] Исследование методик контроля уровня защищенности информации на объектах критической информационной инфраструктуры
ИИ Лившиц, АС Бакшеев - Вопросы кибербезопасности, 2022 - cyberrus.info
Научная новизна заключается в разработке модели аудита ИБ для объектов КИИ,
отличающаяся возможностью «двойного» режима для полного цикла обеспечения …
отличающаяся возможностью «двойного» режима для полного цикла обеспечения …
Noise level assessment of Mobile Telecommunication Base Stations Proximate to Residential areas in Accra, Ghana
The installation of base stations in Accra and other urban centers meant to expand mobile
phone network coverage has met opposition from the public. This study was carried out to …
phone network coverage has met opposition from the public. This study was carried out to …
Cyber Risk Assessment for Cyber-Physical Systems: A Review of Methodologies and Recommendations for Improved Assessment Effectiveness
Cyber-Physical Systems (CPS) integrate physical and embedded systems with information
and communication technology systems, monitoring and controlling physical processes with …
and communication technology systems, monitoring and controlling physical processes with …
Overview and Recommendations for Cyber Risk Assessment in Nuclear Power Plants
F Zhang, K Kelly - Nuclear Technology, 2023 - Taylor & Francis
Digital instrumentation and control (I&C) systems are being deployed in nuclear power
plants (NPPs) for both existing and advanced reactor designs. As I&C systems become more …
plants (NPPs) for both existing and advanced reactor designs. As I&C systems become more …