[HTML][HTML] Onto-CARMEN: ontology-driven approach for cyber–physical system security requirements meta-modelling and reasoning
C Blanco, DG Rosado, ÁJ Varela-Vaca… - Internet of Things, 2023 - Elsevier
In the last years, Cyber–physical systems (CPS) have attracted substantial mainstream,
especially in the industrial sector, since they have become the focus of cyber-attacks. CPS …
especially in the industrial sector, since they have become the focus of cyber-attacks. CPS …
[PDF][PDF] The enterprise economic security system: the state assessment using management functional types
O Illiashenko, Y Rudnichenko, T Momot… - International Journal for …, 2020 - ijqr.net
The use of the model of the state assessment of an enterprise economic security system
allows to get a general assessment of the system state and its balance by type of …
allows to get a general assessment of the system state and its balance by type of …
CyberSPL: a framework for the verification of cybersecurity policy compliance of system configurations using software product lines
Cybersecurity attacks affect the compliance of cybersecurity policies of the organisations.
Such disadvantages may be due to the absence of security configurations or the use of …
Such disadvantages may be due to the absence of security configurations or the use of …
Optimization of the Sources Structure of Financing the Implementation of Strategic Guidelines for Ensuring the Economic Security of Investment Activities of an …
O Zlotenko, Y Rudnichenko, O Illiashenko… - Tem Journal, 2019 - ceeol.com
The purpose of the research is to determine the optimal structure for financing the
investment activities of industrial enterprises in the context of ensuring the economic security …
investment activities of industrial enterprises in the context of ensuring the economic security …
Definition and verification of security configurations of cyber-physical systems
Abstract The proliferation of Cyber-Physical Systems (CPSs) is raising serious security
challenges. These are complex systems, integrating physical elements into automated …
challenges. These are complex systems, integrating physical elements into automated …
Process instance query language to include process performance indicators in DMN
JM Perez-Alvarez, MT Gomez-Lopez… - 2016 IEEE 20th …, 2016 - ieeexplore.ieee.org
Companies are increasingly incorporating commercial Business Process Management
Systems (BPMSs) as mechanisms to automate their daily procedures. These BPMSs …
Systems (BPMSs) as mechanisms to automate their daily procedures. These BPMSs …
An Approach for Verification of Secure Access Control Using Security Pattern
According to OWASP‐2021, more than 3, 00,000 web applications have been detected for
unauthenticated and unauthorised access leading to a breach of security trust. Security …
unauthenticated and unauthorised access leading to a breach of security trust. Security …
Optimization of Information Analytical Support for Assessing the Reliability of Counterparties from the Standpoint of Economic Security.
L Hnylytska, I Gavrylychenko, S Melnyk, O Illiashenko… - TEM Journal, 2021 - ceeol.com
To solve the problem of finding effective methodological approaches that would make it
possible to determine the level of security of relations with market entities with a high degree …
possible to determine the level of security of relations with market entities with a high degree …
Implementation of managerial innovations in the system of providing economic security for subjects of foreign economic activity
YM Rudnichenko, NI Havlovska… - Науковий вісник …, 2018 - nvp.stu.cn.ua
Анотація Актуальність теми дослідження. Активізація трансформаційних процесів у
зовнішньоекономічних відносинах і необхідність пошуку нових ринків збуту продукції …
зовнішньоекономічних відносинах і необхідність пошуку нових ринків збуту продукції …
Formally Modeled Common Weakness Enumerations (CWEs)
V Koscinski, M Mirakhorli - Proceedings of the 39th IEEE/ACM …, 2024 - dl.acm.org
The Common Weakness Enumeration is a community-developed list of common software
weaknesses, also known as CWEs, that could lead to exploitable security vulnerabilities …
weaknesses, also known as CWEs, that could lead to exploitable security vulnerabilities …