Castrucci et al., 2012 - Google Patents
Design and implementation of a mediation system enabling secure communication among Critical InfrastructuresCastrucci et al., 2012
View PDF- Document ID
- 2335624537068973599
- Author
- Castrucci M
- Neri A
- Caldeira F
- Aubert J
- Khadraoui D
- Aubigny M
- Harpes C
- Simões P
- Suraci V
- Capodieci P
- Publication year
- Publication venue
- International Journal of Critical Infrastructure Protection
External Links
Snippet
Nowadays, the increase of interdependencies among different Critical Infrastructures (CI) makes it more and more difficult to protect without using a systemic approach that considers a single infrastructure as part of a complex system of infrastructures. A strong collaboration …
- 238000004891 communication 0 title description 38
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Pohrmen et al. | Blockchain‐based security aspects in heterogeneous Internet‐of‐Things networks: a survey | |
US10958662B1 (en) | Access proxy platform | |
Castrucci et al. | Design and implementation of a mediation system enabling secure communication among Critical Infrastructures | |
Misra et al. | Securing the internet of things | |
Liu et al. | Cyber security and privacy issues in smart grids | |
Metke et al. | Smart grid security technology | |
US8327441B2 (en) | System and method for application attestation | |
Yakubu et al. | Security challenges in fog-computing environment: a systematic appraisal of current developments | |
Kalogridis et al. | Toward unified security and privacy protection for smart meter networks | |
Dehalwar et al. | Blockchain-based trust management and authentication of devices in smart grid | |
Li et al. | Blockchain-empowered data-driven networks: A survey and outlook | |
Johnson et al. | Cybersecurity for electric vehicle charging infrastructure | |
Yadav et al. | A review of possibilities and solutions of cyber attacks in smart grids | |
Gil Pérez et al. | RepCIDN: A reputation-based collaborative intrusion detection network to lessen the impact of malicious alarms | |
Patwary et al. | Authentication, access control, privacy, threats and trust management towards securing fog computing environments: A review | |
Chowdhury | Security in cloud computing | |
Doelitzscher et al. | Sun behind clouds-on automatic cloud security audits and a cloud audit policy language | |
Zheng et al. | Smart grid: Cyber attacks, critical defense approaches, and digital twin | |
Gupta | Non-functional requirements elicitation for edge computing | |
Sukiasyan et al. | Secure data exchange in Industrial Internet of Things | |
Quadar et al. | Cybersecurity issues of IoT in ambient intelligence (AmI) environment | |
Gupta et al. | A survey on the security of pervasive online social networks (POSNs) | |
Monir | A Lightweight Attribute-Based Access Control System for IoT. | |
Ravi et al. | Secured energy ecosystems under distributed energy resources penetration | |
Jena et al. | A Pragmatic Analysis of Security Concerns in Cloud, Fog, and Edge Environment |