Cybersecurity for digital manufacturing

D Wu, A Ren, W Zhang, F Fan, P Liu, X Fu… - Journal of manufacturing …, 2018 - Elsevier
Digital manufacturing aims to create highly customizable products with higher quality and
lower costs by integrating Industrial Internet of Things, big data analytics, cloud computing …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …

Cybersecurity in ports: a conceptual approach

J Ahokas, T Kiiski, J Malmsten, LM Ojala - Digitalization in Supply …, 2017 - econstor.eu
As the world is becoming increasingly digitalized, the role of cybersecurity on society is
mounting. Recent cyberattacks have showed the vulnerability of critical infrastructure …

[图书][B] Ethical hacking

A Maurushat - 2019 - library.oapen.org
How will governments and courts protect civil liberties in this new era of hacktivism? Ethical
Hacking discusses the attendant moral and legal issues. The first part of the 21st century will …

[HTML][HTML] Protección legal para la búsqueda y notificación de vulnerabilidades de ciberseguridad en Chile

D Álvarez-Valenzuela, A Hevia Angulo - Revista chilena de derecho y …, 2020 - SciELO Chile
En estos días, a fines de 2020, se discute en el Congreso Nacional de Chile, el proyecto de
ley que implementa el Convenio de Budapest sobre Cibercrimen y que deroga la Ley Nº19 …

Analysis, detection, and prevention of cryptographic ransomware

ZA Genç - 2020 - orbilu.uni.lu
Cryptographic ransomware encrypts files on a computer system, thereby blocks access to
victim's data, until a ransom is paid. The quick return in revenue together with the practical …

'They're all about pushing the products and shiny things rather than fundamental security': Mapping socio-technical challenges in securing the smart home

J Chen, L Urquhart - Information & Communications Technology …, 2022 - Taylor & Francis
Insecure connected devices can cause serious threats not just to smart home-owners, but
also the underlying infrastructural network. There has been increasing academic and …

La autorización como causal de atipicidad en el delito de acceso ilícito a un sistema informático en la legislación chilena de delitos informáticos

R Navarro Dolmestch - Revista chilena de derecho y tecnología, 2023 - SciELO Chile
Este artículo examina el ámbito y aplicación de la cláusula de exclusión de pena regulada
en el artículo 16 de la Ley N° 21.459, sobre delitos informáticos, prevista para el acceso …

Addressing cyber security vulnerabilities and initiatives in Malaysia maritime industry

MM Noor - Journal of Maritime Research, 2022 - jmr.unican.es
Cyber security is a global issue to any organisations, sectors and industries. Thus, this piece
of article is important for this journal as it focuses on interdisciplinary cyber security in human …

Assessing randomness in case assignment: the case study of the Brazilian Supreme Court

D Marcondes, C Peixoto, JM Stern - Law, Probability and Risk, 2019 - academic.oup.com
Sortition, ie random appointment for public duty, has been employed by societies throughout
the years as a firewall designated to prevent illegitimate interference between parties in a …