Filters








1,961 Hits in 7.1 sec

Challenges for the cyber-physical manufacturing enterprises of the future

Hervé Panetto, Benoit Iung, Dmitry Ivanov, Georg Weichhart, Xiaofan Wang
<span title="">2019</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7q5x2aosp5a55jied5vd5jba6m" style="color: black;">Annual Reviews in Control</a> </i> &nbsp;
control, the creation of resilient enterprise to cope with risks, developments in management decision-support systems for the design, and scheduling and control of resilient and digital manufacturing  ...  Due to increasing number of elements and systems, complex and heterogeneous enterprise systems need to be considered (e.g., for decision-making).  ...  of manufacturing.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.arcontrol.2019.02.002">doi:10.1016/j.arcontrol.2019.02.002</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/giwvo3v3dzggpkhu7elcofsrva">fatcat:giwvo3v3dzggpkhu7elcofsrva</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200323151247/https://hal.archives-ouvertes.fr/hal-02012547/document" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a7/23/a723658c3ae725df4d4a2ecddb9ca0722459dd93.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.arcontrol.2019.02.002"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Dynamic Games for Secure and Resilient Control System Design [article]

Yunhan Huang, Juntao Chen, Linan Huang, Quanyan Zhu
<span title="2019-10-19">2019</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
to the design of modern control systems.  ...  cyber-physical-human control systems.  ...  Dynamic Games for Risk Management of Networked Systems Game theory is widely adopted in the risk management of complex engineering systems [69] , [70] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1910.07510v3">arXiv:1910.07510v3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4rxeyse6dnbspop7hxalhzcedq">fatcat:4rxeyse6dnbspop7hxalhzcedq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200904183348/https://arxiv.org/pdf/1910.07510v3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/eb/0f/eb0f4bdb245c4532e69458c2e703bffa0de03f3c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1910.07510v3" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Communication Risk Management Strategy [chapter]

<span title="2016-05-13">2016</span> <i title="Routledge"> Cyber Security Management </i> &nbsp;
Peter is Managing Director of GAMMA (Global Alliance of Marketing and Management Associations) Europe and is a Fellow of the Higher Education Academy and the Royal Society of Arts, and a Member of the  ...  He has studied at a number of institutions including Cranfield Institute of Technology (MSc and PhD), City University (MBA) and the University of Cambridge (MEd).  ...  The title of the research project was 'Integrated model for the management of the complexity, risk and resilience of secure information infrastructure'. xx C y b e r S e c u r i t y M a n a g e m e n t  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4324/9781315575698-12">doi:10.4324/9781315575698-12</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2igpwld6tjd3tlrbaxknsnvlna">fatcat:2igpwld6tjd3tlrbaxknsnvlna</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201229033447/https://s3-euw1-ap-pe-ws4-capi2-distribution-p.s3-eu-west-1.amazonaws.com/books/9781315575698/HUBPMP/9781315575698_googleScholarPDF.pdf?response-content-disposition=attachment%3B%20filename%3D%229781315575698_googlepreview.pdf%22&amp;response-content-type=application%2Fpdf&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEJv%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCWV1LXdlc3QtMSJHMEUCIALAKsF%2BMBBWOL2Fx0zqR6hzEoDRVp7D7YqjTN2omu0SAiEAlDBL7zGOIEIUjssPkjuDhK%2BUDd5LHOUQCV9l6cFo3p4qtAMIVBACGgwwMTIxNzcyNjQ1MTEiDEO4rNOrFLtbSA9QFyqRA7ZjeKwSEXe5sUX%2BOI7V9txjOsZ7I%2BpgvBF5pmwUzt3rllCgz2mnfwHUsInHS%2Fem8KZ%2FXUxnjqSRDkTR7C7gWQqFpaCmU1fluAZBdk5ZbUKtm38ZhTn9GEs%2FjhZO4FZMmDLZ%2BFzNYLylhYxJxVAt4JhwBEqGCd44oxNK1kiBnOjmr2K8OEuAjM1zhama%2FQwgxAr4NAn%2FOL9gAMv0tImo2EmmmOLvvsUEAQwjzV1s51%2Famaug7sYIsh7xGPxgXE8lf79AuEuadwHh5Q7myVtng8NPJnV7QpCXHF4dFLRec79ksd3MUy%2BeMplE34nx8j1jibRANGDRWpPlown7%2BIi2zfyFfHlAlyKnEQdsyQx99AIvsG4iw0sp%2Bp75Akw9Z2XvZjkTJNH8v%2Ba1%2BFt5KjjEPEbJVvrU6RyrW5tXkub1LUHuJzbcW%2BXAQ%2BIVjb56A6enyV%2BXcV45QanW5ty9wxfJsiNbM7KTXxSrUQs8ZQZOvOFQhaLTNeFriNxLxhvvq18%2FimeOOmq1UPIS%2Bg%2Fr%2F3onQSa8MOSmqv8FOusBn1UqIqIo7H1ehXQCjStViM1C3blPTRkmWZntkpVhTe9WBjitrsK47dgXiHyLNUmkXfDWM%2B%2FeL8dBxBK0sacVLoqChovNVVJTWYRQGxe0kU1bCqBTU9xX430AMD1zbQ01lMu%2F4qQGpl9JegQDRNokAYjkSQAp8W%2FllqXn3zNkw78GSijx0iL%2FM1hAEGa7nuON8Mjk%2FPPc9wtJjRjTQwXow1IMzOXOmThiDxVVgUjr6PE1PSC7hUlQA4H%2BJUw6m%2Bc4X02haNWYRdIdi%2Ff3snc5yZ7toIkh75vEvqHSzLc8fe9pU6ByHmDJms%2FBfQ%3D%3D&amp;AWSAccessKeyId=ASIAQFVOSJ57Y65OIMWS&amp;Expires=1609817686&amp;Signature=hzU8cxjVU2iWvCpPdf1fe8YYiH0%3D" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0f/ee/0feed9e9a075a76c741db36c5ff28a296f0d8337.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4324/9781315575698-12"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Components and challenges of integrated cyber risk management

Thomas Kosub
<span title="2015-09-01">2015</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7wgrhf3xjvfg7n73a75wr4nghi" style="color: black;">Zeitschrift für die gesamte Versicherungswissenschaft</a> </i> &nbsp;
The study emphasizes that a comprehensive management of cyber risks needs well-designed internal risk management structures as well as adequate awareness for such threats.  ...  In addition, we discuss existing challenges and problems of cyber risk management.  ...  of cyber risk into seven categories (internal IT enterprise, counterparties and partners, outsourced and contract, supply chain, disruptive technologies, upstream infrastructure, and external shocks).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s12297-015-0316-8">doi:10.1007/s12297-015-0316-8</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rmrbxtpdtfcl3e7zbirip2o5c4">fatcat:rmrbxtpdtfcl3e7zbirip2o5c4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200709200732/https://www.actuaries.asn.au/Library/Events/ASTINAFIRERMColloquium/2015/KosubCyberRiskPaper.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/45/77/4577813ce8f440864a8d4394da8a1719090f5257.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s12297-015-0316-8"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Modeling Interdependent Infrastructures for Sustainable Counterterrorism

Yacov Y. Haimes, Barry M. Horowitz
<span title="">2004</span> <i title="American Society of Civil Engineers (ASCE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jedjlpbljbcy5mesef4piudjd4" style="color: black;">Journal of Infrastructure Systems</a> </i> &nbsp;
We are especially indebted to Joost Santos for his help in drawing the roadmap presented as Fig. 1 and for his assistance in reviewing the modeling literature.  ...  Acknowledgments We appreciate the contributions received in the preparation of this Forum from Kenneth Crowther, Della Dirickson, Jim Lambert, and Chenyang Lian.  ...  human, social, and organizational dynamics of the terrorist networks and targeted countries, as well as the complex interconnected and interdependent physical and cyber infrastructures of the free world  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1061/(asce)1076-0342(2004)10:2(33)">doi:10.1061/(asce)1076-0342(2004)10:2(33)</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/tq7k3ibzbresnc5dsxcz2ixaea">fatcat:tq7k3ibzbresnc5dsxcz2ixaea</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20060916180248/https://healthsystem.virginia.edu/internet/ciag/conference/articles/s2006/haimes_modeling_interdependent_infrastructures_for_sustainable_counterterrorism.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/99/f7/99f78f6554fe09bfa629dddc67dcdb18c03c1592.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1061/(asce)1076-0342(2004)10:2(33)"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Pattern-based Business Model Development for Cyber-Physical Production Systems

Vinzent Rudtsch, Jürgen Gausemeier, Judith Gesing, Tobias Mittag, Stefan Peter
<span title="">2014</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/pg7ahjk7dvd2tinhv7p6przfy4" style="color: black;">Procedia CIRP</a> </i> &nbsp;
It contains a design scheme to model value creation networks as well as typical configurations of these networks.  ...  The application of Cyber-Physical Systems (CPS) in production systems leads to Cyber-Physical Production Systems (CPPS) or the Smart Factory, respectively.  ...  Cyber-Physical Production Systems Embedded systems are major drivers of innovation for current hightech products.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.procir.2014.10.044">doi:10.1016/j.procir.2014.10.044</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lrtqy7bdfvhyrjuwmddeecpkvu">fatcat:lrtqy7bdfvhyrjuwmddeecpkvu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808123714/http://www.detconference.org/download/det2014/det2014_submission_13.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f8/3e/f83efec57b6089e233bb43fcfff80cfe877c1de8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.procir.2014.10.044"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> elsevier.com </button> </a>

Additive Manufacturing Cyber-Physical System: Supply Chain and Risks

Nikhil Gupta, Akash Tiwari, Satish T. S. Bukkapatnam, Ramesh Karri
<span title="">2020</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
These methods offer the freedom of complexity to the designers and choices of localized and pull-based production system to the managers.  ...  the AM process a cyber-physical system (CPS).  ...  In addition, due to the cyber-physical nature of AM, cyber risk management of the AM supply chain is also required to be addressed.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.2978815">doi:10.1109/access.2020.2978815</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qbdq6d36gfgwlih57hjgqe27oq">fatcat:qbdq6d36gfgwlih57hjgqe27oq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201108163608/https://ieeexplore.ieee.org/ielx7/6287639/8948470/09026901.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ba/38/ba382ad0bccd912a7e0bd2139074f03180dcc6b8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.2978815"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security

Carol A. Siegel, Ty R. Sagalow, Paul Serritella
<span title="">2002</span> <i title="Informa UK Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ei2lg7nafnbexbrtfoen5peobe" style="color: black;">Information Systems Security</a> </i> &nbsp;
These controls entail security at the operating Cyber-Risk Article © 2002 3/4/02 Siegel, Sagalow, Serritella system level for enterprise systems, as well as trust management, encryption, data security,  ...  Thus, the same risk management formula that discussed above should be implemented for the risk of cyber-terrorism.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1201/1086/43322.11.4.20020901/38843.5">doi:10.1201/1086/43322.11.4.20020901/38843.5</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/yhdp3l7uujgrrd3qpbqcrj3n6u">fatcat:yhdp3l7uujgrrd3qpbqcrj3n6u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809120922/http://www.eprivacy.com/lectures/cyber-risk.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a5/15/a5154c1c7baa22c57179c049514460ee9b45cd56.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1201/1086/43322.11.4.20020901/38843.5"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

The National Infrastructure Protection Plan [chapter]

Allen Krotman, Janice Ballo, Marion Warwick
<span title="2009-11-04">2009</span> <i title="CRC Press"> Public Administration and Public Policy </i> &nbsp;
Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for  ...  Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining  ...  1A.3.3 Assess Risks Risk assessment for cyber assets, systems, and networks is an integral part of the risk management framework described in the NIPP.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1201/9781420071825-c29">doi:10.1201/9781420071825-c29</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/sanij4l2krahfgfqiuzz35wg7i">fatcat:sanij4l2krahfgfqiuzz35wg7i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170923115058/http://www.dtic.mil/get-tr-doc/pdf?AD=ADA451624" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/01/5d/015db406ee2bb8ec61543553c42cc4a087a7511c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1201/9781420071825-c29"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Framework for Sustainable Risk Management in the Manufacturing Sector

C.F. Oduoza
<span title="">2020</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sqnbv6uavzg4nagumbc5c6qwmi" style="color: black;">Procedia Manufacturing</a> </i> &nbsp;
The work carried out here has developed a framework for risk management affordable and suitable for use especially by small and medium size enterprises in the manufacturing sector.  ...  The work carried out here has developed a framework for risk management affordable and suitable for use especially by small and medium size enterprises in the manufacturing sector.  ...  on performance and propose a methodology to manage such risksDesign a framework that should form a basis for development of a risk management system in the manufacturing sector Literature Review  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.promfg.2020.10.180">doi:10.1016/j.promfg.2020.10.180</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/sgby7dbarffz5iavd6epsspux4">fatcat:sgby7dbarffz5iavd6epsspux4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210428024739/https://wlv.openrepository.com/bitstream/handle/2436/623285/Oduoza_Framework_for_sustainable_risk_management_2020.pdf;jsessionid=43A44E21948C11BD1846815A0629B21F?sequence=6" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9b/31/9b313dcee6d22fe698154a9827de8b3a367d56fe.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.promfg.2020.10.180"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> elsevier.com </button> </a>

Aspects of the Evolution from Risk Management to Enterprise Global Risk Management

Ivan Popchev, Irina Radeva, Irena Nikolova
<span title="2021-04-06">2021</span> <i title="Prof. Marin Drinov Publishing House of BAS (Bulgarian Academy of Sciences)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6dvl7i75vvbxlor4hb6hzvs564" style="color: black;">Engineering Sciences</a> </i> &nbsp;
The goal of this paper is to summarize the mainly used risk management standards, to analyze the general aspects of evolution of risk management, enterprise risk management, enterprise integrated risk  ...  management and to suggest the concept for the next step which is enterprise global risk management, where are implemented Industry 4.0 risk and Artificial Intelligence.  ...  ACKNOWLEDGEMENTS This work is supported by grand KP-06-H36/2 BG PlantNET "Establishment of National Information Network GENEbank -Plant Genetic Resources".  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7546/engsci.lviii.21.01.02">doi:10.7546/engsci.lviii.21.01.02</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wp6eqlvxkjehzelushrxo535ke">fatcat:wp6eqlvxkjehzelushrxo535ke</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210420061908/http://es.ims.bas.bg/Abstracts/A2021/a1/01-02.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ba/71/ba71002461d886fc3621c9bb51b6d823a53646cb.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7546/engsci.lviii.21.01.02"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Institute Resilience Through Detection, Response, and Recovery [chapter]

Dan Blum
<span title="">2020</span> <i title="Apress"> Rational Cybersecurity for Business </i> &nbsp;
Cyber-resilience provides the ability to withstand and mitigate the impacts of information risks.  ...  Businesses should develop response plans for common types of incidents and for potential incidents from top risk scenarios.  ...  Above-average risk management, business continuity, and response processes are requisites for cyber-resilience.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-1-4842-5952-8_9">doi:10.1007/978-1-4842-5952-8_9</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/52wtkyvlsvbv3d7kwcjmqlbl7e">fatcat:52wtkyvlsvbv3d7kwcjmqlbl7e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200813021420/https://link.springer.com/content/pdf/10.1007%2F978-1-4842-5952-8_9.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c4/8e/c48efc02162f54dfb762110e68c7e68ce0d3c88f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-1-4842-5952-8_9"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Risks and threats to economic security in the digital economy

Irina Kirishchieva, Mikhail Skorev, Oksana Mishchenko, Tatiana Grafova, S. Roshchupkin
<span title="">2021</span> <i title="EDP Sciences"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/dbuzp3mfvbefnluvdapck2fut4" style="color: black;">SHS Web of Conferences</a> </i> &nbsp;
The presented risks and threats to the security of an enterprise in a digital economy emphasize the need to improve the electronic security system.  ...  At the same time, the features of the process of ensuring electronic safety in the context of digital development lie in the development and use of tools for identifying and assessing risks, indicators  ...  The enterprise, as a cell of the economic system, has a direct impact on its sustainable and dynamic development.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1051/shsconf/202111001028">doi:10.1051/shsconf/202111001028</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/duh5kih265fw5mvf6ilarg7u64">fatcat:duh5kih265fw5mvf6ilarg7u64</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210613051601/https://www.shs-conferences.org/articles/shsconf/pdf/2021/21/shsconf_icemt2021_01028.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ed/ef/edefce4b8c769820349267cec8ba9e57adc88c2d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1051/shsconf/202111001028"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Assessing the Maturity of National Cybersecurity and Resilience

George Sharkov
<span title="">2020</span> <i title="Procon, Ltd."> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/qz32iipqwbgpnhwjxlnrvwts3a" style="color: black;">Connections The Quarterly Journal</a> </i> &nbsp;
and analyzed for their applicability in designing and implementing national cybersecurity strategies and programs to achieve cyber resilience.  ...  A maturity-based approach for the Bulgarian cyber resilience roadmap is also described within the context of the evolving cyber-empowered hybrid threats and the need for an institutionalized collaborative  ...  In addition, due to the multi-layered "cyber terrain" (a term introduced by the US Department of Defense, DoD, and further detailed by Shawn Riley 1 ) and complex systems interdependencies, the new risks  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.11610/connections.19.4.01">doi:10.11610/connections.19.4.01</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/czsbetcnqrewda5g427egkqrhi">fatcat:czsbetcnqrewda5g427egkqrhi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210121111230/https://connections-qj.org/system/files/19.4.01_sharkov_cyber_resilience_maturity.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/34/ce/34ce4f1cd191bedea2affe1bec817c67148fe61a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.11610/connections.19.4.01"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System

Halima Kure, Shareeful Islam, Mohammad Razzaque
<span title="2018-05-30">2018</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/smrngspzhzce7dy6ofycrfxbim" style="color: black;">Applied Sciences</a> </i> &nbsp;
Section 2 outlines state-of-the-art cyber security risk management practices for the cyber physical system and existing framework and standards.  ...  (iii) an evaluation of the proposed integrated risk management approach into a real cyber physical system.  ...  Author Contributions: H.I.K. and S.I. contributed to the design and development of the proposed integrated risk management framework, concepts, and process.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/app8060898">doi:10.3390/app8060898</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lszurndq3veedfgwfg2vnmhxuy">fatcat:lszurndq3veedfgwfg2vnmhxuy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200307090949/https://research.tees.ac.uk/ws/files/7156156/applsci_08_00898.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4b/f8/4bf82a4cc748d45f7c8729ae1b202b5bd0b7de40.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/app8060898"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 1,961 results