Industry 4.0 implications in logistics: an overview

L Barreto, A Amaral, T Pereira - Procedia manufacturing, 2017 - Elsevier
During the last decade, the use and evolution of Information and Communication
Technologies (ICT) in industry have become unavoidable. The emergence of the Industry …

A systems and control perspective of CPS security

SM Dibaji, M Pirani, DB Flamholz… - Annual reviews in …, 2019 - Elsevier
The comprehensive integration of instrumentation, communication, and control into physical
systems has led to the study of Cyber-Physical Systems (CPSs), a field that has recently …

[BOG][B] Research methods for cyber security

TW Edgar, DO Manz - 2017 - books.google.com
Research Methods for Cyber Security teaches scientific methods for generating impactful
knowledge, validating theories, and adding critical rigor to the cyber security field. This book …

Explainable artificial intelligence approaches: A survey

SR Islam, W Eberle, SK Ghafoor, M Ahmed - arxiv preprint arxiv …, 2021 - arxiv.org
The lack of explainability of a decision from an Artificial Intelligence (AI) based" black box"
system/model, despite its superiority in many real-world applications, is a key stumbling …

[BOG][B] Cryptography: theory and practice

DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …

The impact of information security threat awareness on privacy-protective behaviors

S Mamonov, R Benbunan-Fich - Computers in Human Behavior, 2018 - Elsevier
In this study, we examine how to motivate computer users to protect themselves from
potential security and privacy threats. We draw on the Information Processing framework …

Distributed intrusion detection system in a multi-layer network architecture of smart grids

Y Zhang, L Wang, W Sun, RC Green II… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
The advent of the smart grid promises to usher in an era that will bring intelligence,
efficiency, and optimality to the power grid. Most of these changes will occur as an Internet …

Cyber security threat analysis and modeling of an unmanned aerial vehicle system

AY Javaid, W Sun, VK Devabhaktuni… - 2012 IEEE conference …, 2012 - ieeexplore.ieee.org
Advances in technology for miniature electronic military equipment and systems have led to
the emergence of unmanned aerial vehicles (UAVs) as the new weapons of war and tools …

The vulnerability of UAVs to cyber attacks-An approach to the risk assessment

K Hartmann, C Steup - 2013 5th international conference on …, 2013 - ieeexplore.ieee.org
By 2012 the US military had increased its investment in research and production of
unmanned aerial vehicles (UAVs) from 2.3billionin2008to 4.2 billion 1. Currently UAVs are …

[BOG][B] The Linux programming interface: a Linux and UNIX system programming handbook

M Kerrisk - 2010 - books.google.com
The Linux Programming Interface (TLPI) is the definitive guide to the Linux and UNIX
programming interface—the interface employed by nearly every application that runs on a …