The paper presents the results of the development of a method for assessing the security of cyber-physical systems based on the Lotka–Volterra model. Security models of cyber-physical systems are proposed: “predator–prey” taking into account the computing capabilities and focus of targeted cyberattacks, “predator–prey” taking into account the possible competition of attackers in relation to the “prey”, “predator–prey” taking into account the relationships between “prey species” and “predator species”, “predator–prey” taking into account the relationship between “prey species” and “predator species”. Based on the proposed approach, the coefficients of the Lotka–Volterra model α=0.39, β=0.32, γ=0.29, φ=0.27 were obtained, which take into acco...
Cyber-Physical Systems (CPSs) are integrations of networking and distributed computing systems with ...
This thesis investigates the resilience of Cyber-Physical Systems (CPS). CPS integrate computation a...
Traditional techniques for Cyber-Physical Systems (CPS) security design either treat the cyber and p...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The development of technologies and computing resources has not only expanded the range of digital s...
Threat modeling provides a systematic way to identify cybersecurity threats. It is an essential part...
© 2017, Springer International Publishing AG. Cyber-Physical Systems are heavily used in today’s wor...
This thesis addresses the individuation of the appropriate scientific tools in order to create a met...
peer reviewedRecent initiatives that evaluate the security of physical systems with objects as asset...
Recent initiatives that evaluate the security of physical systems with objects as assets and people ...
This chapter reports on a model-based approach to assessing cyber-risks in a cyber-physical system (...
Information technology (IT) systems are growing in complexity and are becoming more and more connect...
Information technology (IT) systems are growing in complexity and are becoming more and more connect...
W pracy poruszono zagadnienia ataków w cyberprzestrzeni opartej na sieciach komputerowych (w tym Int...
Cyber-Physical Systems (CPSs) are integrations of networking and distributed computing systems with ...
This thesis investigates the resilience of Cyber-Physical Systems (CPS). CPS integrate computation a...
Traditional techniques for Cyber-Physical Systems (CPS) security design either treat the cyber and p...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The development of technologies and computing resources has not only expanded the range of digital s...
Threat modeling provides a systematic way to identify cybersecurity threats. It is an essential part...
© 2017, Springer International Publishing AG. Cyber-Physical Systems are heavily used in today’s wor...
This thesis addresses the individuation of the appropriate scientific tools in order to create a met...
peer reviewedRecent initiatives that evaluate the security of physical systems with objects as asset...
Recent initiatives that evaluate the security of physical systems with objects as assets and people ...
This chapter reports on a model-based approach to assessing cyber-risks in a cyber-physical system (...
Information technology (IT) systems are growing in complexity and are becoming more and more connect...
Information technology (IT) systems are growing in complexity and are becoming more and more connect...
W pracy poruszono zagadnienia ataków w cyberprzestrzeni opartej na sieciach komputerowych (w tym Int...
Cyber-Physical Systems (CPSs) are integrations of networking and distributed computing systems with ...
This thesis investigates the resilience of Cyber-Physical Systems (CPS). CPS integrate computation a...
Traditional techniques for Cyber-Physical Systems (CPS) security design either treat the cyber and p...