The globalisation and outsourcing of the IC supply chain have led to a more complex production cycle. Using threat models to understand the attacks can help engineers build stronger countermeasures and evaluate against different options to create better protection from attacks. Gamification is an alternative to teaching engineers threats using threat models and trying to keep up to date with new threats. Playing a serious game based on the IC hardware supply chain allows players to take control of self-learning and build knowledge through experiences in the gameplay. This paper propose CIST: A serious game for hardware supply chain, designed for hardware security and uses a threat model called CIST, designed to overcome the different requir...
-Industrial control organizations need to perform IT security preparedness exercises more frequentl...
In the very rapid digital revolution we are experiencing, the availability of cybersecurity experts ...
Threats to critical infrastructure are not passive. Trying to identify what is in fact ’critical’ is...
The globalisation and outsourcing of the IC supply chain have led to a more complex production cycle...
Cyber attacks have been increasing, and there have been many media reports of attacks against large ...
The field of cybersecurity plays a crucial role for building safer societies and more resilient comm...
Critical infrastructures provide essential services to our everyday lives. Even a minor failure on a...
Improving both efficiency and security in international supply chains requires a new approach in dat...
Cyber attacks are increasing in number and sophistication, causing organisations to continuously ada...
This paper presents the rationale for the design of a card deck game sustaining information security...
International audienceThe Internet of Things (IoT) sees the appearance of ever more connected object...
Cloud computing has become a convenient technology widely used in industry, providing profit and fle...
AbstractManaging the quality of a product and a company within a production network is a challenging...
Today, many products and solutions are provided on the cloud; however, the amount and financial loss...
With rapid digitalization and technical growth, the IT systems that we are using are becoming extrem...
-Industrial control organizations need to perform IT security preparedness exercises more frequentl...
In the very rapid digital revolution we are experiencing, the availability of cybersecurity experts ...
Threats to critical infrastructure are not passive. Trying to identify what is in fact ’critical’ is...
The globalisation and outsourcing of the IC supply chain have led to a more complex production cycle...
Cyber attacks have been increasing, and there have been many media reports of attacks against large ...
The field of cybersecurity plays a crucial role for building safer societies and more resilient comm...
Critical infrastructures provide essential services to our everyday lives. Even a minor failure on a...
Improving both efficiency and security in international supply chains requires a new approach in dat...
Cyber attacks are increasing in number and sophistication, causing organisations to continuously ada...
This paper presents the rationale for the design of a card deck game sustaining information security...
International audienceThe Internet of Things (IoT) sees the appearance of ever more connected object...
Cloud computing has become a convenient technology widely used in industry, providing profit and fle...
AbstractManaging the quality of a product and a company within a production network is a challenging...
Today, many products and solutions are provided on the cloud; however, the amount and financial loss...
With rapid digitalization and technical growth, the IT systems that we are using are becoming extrem...
-Industrial control organizations need to perform IT security preparedness exercises more frequentl...
In the very rapid digital revolution we are experiencing, the availability of cybersecurity experts ...
Threats to critical infrastructure are not passive. Trying to identify what is in fact ’critical’ is...