Digital twin: A comprehensive survey of security threats
Industry 4.0 is having an increasingly positive impact on the value chain by modernizing and
optimizing the production and distribution processes. In this streamline, the digital twin (DT) …
optimizing the production and distribution processes. In this streamline, the digital twin (DT) …
Building A blockchain-based decentralized digital asset management system for commercial aircraft leasing
The blockchain technology has the potential to drastically change the way record-keeping
and asset management is done. While more and more aerospace companies are starting to …
and asset management is done. While more and more aerospace companies are starting to …
Towards trustworthy autonomous systems: Taxonomies and future perspectives
The class of Trustworthy Autonomous Systems (TAS) includes cyber-physical systems
leveraging on self-x technologies that make them capable to learn, adapt to changes, and …
leveraging on self-x technologies that make them capable to learn, adapt to changes, and …
Real-Time APT Detection Technologies: A Literature Review
S Mönch, H Roth - … on Cyber Security and Resilience (CSR), 2023 - ieeexplore.ieee.org
Recently, the usage of advanced persistent threats (APT) increased rapidly in the context of
cyberwar. To perform countermeasures against such attacks, an efficient APT detection is …
cyberwar. To perform countermeasures against such attacks, an efficient APT detection is …
[PDF][PDF] Understanding transnational cyber attribution
One can defend against a cyberattack, but without attribution, attackers lack a deterrent. At
best, secure systems increase the time needed to find a vulnerability to a point beyond that …
best, secure systems increase the time needed to find a vulnerability to a point beyond that …
[PDF][PDF] Towards Trustworthy Autonomous Systems: A Survey of Taxonomies and Future Perspectives
Abstract The class of Trustworthy Autonomous Systems (TAS) includes cyberphysical
systems leveraging on self-x technologies that make them capable to learn, adapt to …
systems leveraging on self-x technologies that make them capable to learn, adapt to …
Attack Traceability
JE Rubio - Encyclopedia of Cryptography, Security and Privacy, 2021 - Springer
Background Traceability of attacks is a wide research area (both in the Industry and
Academia) that comprises multiple monitoring techniques to keep track of the information …
Academia) that comprises multiple monitoring techniques to keep track of the information …