[go: up one dir, main page]

Sujatha et al., 2022 - Google Patents

Cyber Security Applications for Industry 4.0

Sujatha et al., 2022

Document ID
7113938629472626846
Author
Sujatha R
Prakash G
Jhanjhi N
Publication year

External Links

Snippet

Cyber Security Applications for Industry 4.0 (CSAI 4.0) provides integrated features of various disciplines in Computer Science, Mechanical, Electrical, and Electronics Engineering which are defined to be Smart systems. It is paramount that Cyber-Physical …
Continue reading at books.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0639Performance analysis
    • G06Q10/06393Score-carding, benchmarking or key performance indicator [KPI] analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0637Strategic management or analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0635Risk analysis

Similar Documents

Publication Publication Date Title
Hammi et al. Security threats, countermeasures, and challenges of digital supply chains
Lin et al. Toward a safer and more secure cyberspace
Jacobs Engineering information security: The application of systems engineering concepts to achieve information assurance
Caballero Information security essentials for information technology managers: Protecting mission-critical systems
Sujatha et al. Cyber Security Applications for Industry 4.0
Pogrebna et al. Navigating new cyber risks
Priyadarshini Introduction on cybersecurity
Thakral et al. Cybersecurity and ethics for IoT system: A massive analysis
Rana et al. Ransomware attacks in cyber-physical systems: countermeasure of attack vectors through automated web defenses
Rasner Cybersecurity and third-party risk: Third party threat hunting
Rawal et al. Cybersecurity and identity access management
Kamara Securing critical infrastructures
Shandilya et al. Achieving Digital Resilience with Cybersecurity
Kaushik et al. Advanced Techniques and Applications of Cybersecurity and Forensics
Ozkaya Incident Response in the Age of Cloud: Techniques and best practices to effectively respond to cybersecurity incidents
Al-Sibai et al. IoT cybersecurity threats mitigation via integrated technical and non-technical solutions
Vatsyayan et al. A detailed investigation of popular attacks on cyber physical systems
Almasri Towards generating a practical SUNBURST attack dataset for network attack detection
Stoddart Gaining access: Attack and defense methods and legacy systems
Jawed Continuous security in DevOps environment: Integrating automated security checks at each stage of continuous deployment pipeline
Leitner et al. Situational awareness for strategic decision making on a national level
Workman Information security management
Javaid Cyber security: Challenges ahead
Lee A Comprehensive Analysis of Challenges and Strategies in Enhancing Cyber Security for the Defense Industry
Cohen Cybersecurity for critical infrastructure: addressing threats and vulnerabilities in Canada