Sujatha et al., 2022 - Google Patents
Cyber Security Applications for Industry 4.0Sujatha et al., 2022
- Document ID
- 7113938629472626846
- Author
- Sujatha R
- Prakash G
- Jhanjhi N
- Publication year
External Links
Snippet
Cyber Security Applications for Industry 4.0 (CSAI 4.0) provides integrated features of various disciplines in Computer Science, Mechanical, Electrical, and Electronics Engineering which are defined to be Smart systems. It is paramount that Cyber-Physical …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0639—Performance analysis
- G06Q10/06393—Score-carding, benchmarking or key performance indicator [KPI] analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0637—Strategic management or analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0635—Risk analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hammi et al. | Security threats, countermeasures, and challenges of digital supply chains | |
Lin et al. | Toward a safer and more secure cyberspace | |
Jacobs | Engineering information security: The application of systems engineering concepts to achieve information assurance | |
Caballero | Information security essentials for information technology managers: Protecting mission-critical systems | |
Sujatha et al. | Cyber Security Applications for Industry 4.0 | |
Pogrebna et al. | Navigating new cyber risks | |
Priyadarshini | Introduction on cybersecurity | |
Thakral et al. | Cybersecurity and ethics for IoT system: A massive analysis | |
Rana et al. | Ransomware attacks in cyber-physical systems: countermeasure of attack vectors through automated web defenses | |
Rasner | Cybersecurity and third-party risk: Third party threat hunting | |
Rawal et al. | Cybersecurity and identity access management | |
Kamara | Securing critical infrastructures | |
Shandilya et al. | Achieving Digital Resilience with Cybersecurity | |
Kaushik et al. | Advanced Techniques and Applications of Cybersecurity and Forensics | |
Ozkaya | Incident Response in the Age of Cloud: Techniques and best practices to effectively respond to cybersecurity incidents | |
Al-Sibai et al. | IoT cybersecurity threats mitigation via integrated technical and non-technical solutions | |
Vatsyayan et al. | A detailed investigation of popular attacks on cyber physical systems | |
Almasri | Towards generating a practical SUNBURST attack dataset for network attack detection | |
Stoddart | Gaining access: Attack and defense methods and legacy systems | |
Jawed | Continuous security in DevOps environment: Integrating automated security checks at each stage of continuous deployment pipeline | |
Leitner et al. | Situational awareness for strategic decision making on a national level | |
Workman | Information security management | |
Javaid | Cyber security: Challenges ahead | |
Lee | A Comprehensive Analysis of Challenges and Strategies in Enhancing Cyber Security for the Defense Industry | |
Cohen | Cybersecurity for critical infrastructure: addressing threats and vulnerabilities in Canada |