The development of the IT industry and computing resources allows the formation of cyberphysical social systems (CPSS), which are the integration of wireless mobile and Internet technologies and the combination of the Internet of things with the technologies of cyberphysical systems. To build protection systems, while minimizing both computing and economic costs, various sets of security profiles are used, ensuring the continuity of critical business processes. To assess/compare the level of CPSS security, various assessment methods based on a set of metrics are generally used. Security metrics are tools for providing up-to-date information about the state of the security level, cost characteristics/parameters from both the defense and atta...
Much of the world's critical infrastructure is at risk from attack through electronic networks conne...
The concept of security metrics is a very important aspect for information security management. Secu...
The management of information security becomes easier if suitable metrics can be developed to offer ...
Abstract. Much of the world's critical infrastructure is at risk from attack through electronic...
To obtain evidence of the security of different products or organizations, systematic approaches to ...
To obtain evidence of the security of different products or organizations, systematic approaches to ...
The deep integration between the cyber and physical domains in complex systems make very challenging...
How secure is a software product or a telecommunication network, or their fusion? In order to obtain...
In order to obtain evidence of the security and privacy issues of products, services or an organizat...
Report from Dagstuhl seminar 14491. This report documents the program and the outcomes of Dagstuhl S...
This report documents the program and the outcomes of Dagstuhl Seminar 14491 "Socio-Technical Securi...
This report documents the program and the outcomes of Dagstuhl Seminar 14491 "Socio-Technical Securi...
This report documents the program and the outcomes of Dagstuhl Seminar 14491 "Socio-Technical Securi...
Cybersecurity and risk management are an inevitable part of organisations decision-making processes....
This report documents the program and the outcomes of Dagstuhl Seminar 14491 "Socio-Technical Securi...
Much of the world's critical infrastructure is at risk from attack through electronic networks conne...
The concept of security metrics is a very important aspect for information security management. Secu...
The management of information security becomes easier if suitable metrics can be developed to offer ...
Abstract. Much of the world's critical infrastructure is at risk from attack through electronic...
To obtain evidence of the security of different products or organizations, systematic approaches to ...
To obtain evidence of the security of different products or organizations, systematic approaches to ...
The deep integration between the cyber and physical domains in complex systems make very challenging...
How secure is a software product or a telecommunication network, or their fusion? In order to obtain...
In order to obtain evidence of the security and privacy issues of products, services or an organizat...
Report from Dagstuhl seminar 14491. This report documents the program and the outcomes of Dagstuhl S...
This report documents the program and the outcomes of Dagstuhl Seminar 14491 "Socio-Technical Securi...
This report documents the program and the outcomes of Dagstuhl Seminar 14491 "Socio-Technical Securi...
This report documents the program and the outcomes of Dagstuhl Seminar 14491 "Socio-Technical Securi...
Cybersecurity and risk management are an inevitable part of organisations decision-making processes....
This report documents the program and the outcomes of Dagstuhl Seminar 14491 "Socio-Technical Securi...
Much of the world's critical infrastructure is at risk from attack through electronic networks conne...
The concept of security metrics is a very important aspect for information security management. Secu...
The management of information security becomes easier if suitable metrics can be developed to offer ...