Data science in context: Foundations, challenges, opportunities

AZ Spector, P Norvig, C Wiggins, JM Wing - 2022 - books.google.com
Data science is the foundation of our modern world. It underlies applications used by billions
of people every day, providing new tools, forms of entertainment, economic growth, and …

Experimental setup for grid control device software updates in supply chain cyber-security

J Keller, S Paul, S Grijalva… - 2022 North American …, 2022 - ieeexplore.ieee.org
Supply chain cyberattacks that exploit insecure third-party software are a growing concern
for the security of the electric power grid. These attacks seek to deploy malicious software in …

Contemporary Cyber Threats to Critical Infrastructures: Management and Countermeasures

K Mitsarakis - 2023 - repository.ihu.edu.gr
This dissertation was written as a part of the MSc in Cybersecurity at the International
Hellenic University. Nowadays, the unobstructed functioning of society is increasingly …

Cybersecurity in digital supply chains in the procurement process: introducing the digital supply chain management framework

M Aarland - Information & Computer Security, 2024 - emerald.com
Purpose This paper aims to explore the cybersecurity challenges the electric power industry
faces due to its increased reliance on digital supply chains (DSCs), focusing on the …

Experimental System for Supply Chain Cyber-Security of Distribution Switch Controls

J Keller, K Hutto, S Grijalva, V Mooney… - 2024 IEEE Texas …, 2024 - ieeexplore.ieee.org
Cyberattacks that rely on the software supply chain as their attack vector are becoming more
frequent and effective. Attacks such as SolarWinds, NotPetya, and XcodeGhost have …

Digital Supply Chain Roles in the Power Industry

M Aarland - International Conference on Information Technology in …, 2023 - Springer
The digital supply chain, a complex web of actors and interactions, is vital for reliable and
efficient operations. This study examines the factors contributing to reliability within the …

The Broken Verifying: Inspections at Verification Tools for Windows Code-Signing Signatures

G Liu, Q Wang, C Ma, J Lin, Y Fu… - 2023 IEEE 22nd …, 2023 - ieeexplore.ieee.org
Terminal users can deploy verification tools to verify Windows code-signing signatures and
check their details (signing time, certificate chain, etc). Some representative verification tools …

AutoTrust: Automatic software package assessment using trust criteria

HM Morstøl, S Rynning-Tønnesen - 2023 - ntnuopen.ntnu.no
Motivasjon: Denne masteroppgaven er en studie i forsyningskjedesikkerhet for
programvare. Arbeidet var motivert av økningen i programvareangrep på forsyningskjeden …

[引用][C] Using System Thinking to create a resilient Information Security framework.

L Magnusson