Cyberspace relies on information technologies to mediate relations between different people, across different communication networks and is reliant on the supporting technology. These interactions typically occur without physical proximity and those working depending on cybersystems must be able to trust the overall human–technical systems that support cyberspace. As such, detailed discussion of cybersecurity policy would be improved by including trust as a key value to help guide policy discussions. Moreover, effective cybersystems must have resilience designed into them. This paper argues that trustworthy cybersystems are a key element to resilient systems, and thus are core to cybersecurity policy. The paper highlights the importance of ...
Safety is becoming cybersecurity under most circumstances. This should be reflected in the Cybersecu...
Distributed manufacturing operations include cyber-physical systems vulnerable to cyber-attacks. Lon...
Long gone are the years when cyberspace security was only a military concern. Today, it is an issue ...
Cyberspace relies on information technologies to mediate relations between different people, across ...
How can a focus on socio-technical vulnerability and uncertainty make cyber security more resilient?...
The growing sophistication, frequency and severity of cyberattacks targeting all sectors highlight t...
Cyber security is commonly defined as the practice of protecting computers, networks, programs and d...
This book addresses the increasingly daunting task of building confidence in the use of cyber platfo...
The aim of this paper is to depict some of the impacts of the ongoing digital transition on security...
Based on classical contagion models we introduce an artificial cyber lab: the digital twin of a comp...
Introduction: This master thesis explores the concept of cyber resilience and aims at identifying cy...
Most eHealth systems are cyber-physical systems (CPSs) making safety-critical decisions based on inf...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
In this paper I provide an ethical and conceptual analysis of the emerging concern with ‘cybersecuri...
Slowly but surely, academia and industry are fully accepting the importance of the human element as ...
Safety is becoming cybersecurity under most circumstances. This should be reflected in the Cybersecu...
Distributed manufacturing operations include cyber-physical systems vulnerable to cyber-attacks. Lon...
Long gone are the years when cyberspace security was only a military concern. Today, it is an issue ...
Cyberspace relies on information technologies to mediate relations between different people, across ...
How can a focus on socio-technical vulnerability and uncertainty make cyber security more resilient?...
The growing sophistication, frequency and severity of cyberattacks targeting all sectors highlight t...
Cyber security is commonly defined as the practice of protecting computers, networks, programs and d...
This book addresses the increasingly daunting task of building confidence in the use of cyber platfo...
The aim of this paper is to depict some of the impacts of the ongoing digital transition on security...
Based on classical contagion models we introduce an artificial cyber lab: the digital twin of a comp...
Introduction: This master thesis explores the concept of cyber resilience and aims at identifying cy...
Most eHealth systems are cyber-physical systems (CPSs) making safety-critical decisions based on inf...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
In this paper I provide an ethical and conceptual analysis of the emerging concern with ‘cybersecuri...
Slowly but surely, academia and industry are fully accepting the importance of the human element as ...
Safety is becoming cybersecurity under most circumstances. This should be reflected in the Cybersecu...
Distributed manufacturing operations include cyber-physical systems vulnerable to cyber-attacks. Lon...
Long gone are the years when cyberspace security was only a military concern. Today, it is an issue ...