咨询与建议

限定检索结果

文献类型

  • 62 篇 会议
  • 45 篇 期刊文献
  • 6 篇 学位论文

馆藏范围

  • 113 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 98 篇 工学
    • 68 篇 计算机科学与技术...
    • 26 篇 电气工程
    • 18 篇 信息与通信工程
    • 9 篇 控制科学与工程
    • 9 篇 软件工程
    • 8 篇 石油与天然气工程
    • 5 篇 动力工程及工程热...
    • 3 篇 网络空间安全
    • 2 篇 材料科学与工程(可...
    • 2 篇 船舶与海洋工程
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 冶金工程
    • 1 篇 水利工程
    • 1 篇 化学工程与技术
    • 1 篇 环境科学与工程(可...
  • 17 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 3 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 5 篇 理学
    • 3 篇 数学
    • 2 篇 统计学(可授理学、...
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 海洋科学
  • 3 篇 法学
    • 2 篇 法学
    • 1 篇 社会学
  • 2 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 113 篇 operational tech...
  • 29 篇 cybersecurity
  • 23 篇 industrial contr...
  • 17 篇 information tech...
  • 11 篇 scada
  • 10 篇 internet of thin...
  • 10 篇 cyber security
  • 10 篇 cyber-physical s...
  • 9 篇 machine learning
  • 9 篇 security
  • 9 篇 ics
  • 7 篇 industry 4.0
  • 7 篇 critical infrast...
  • 6 篇 ot
  • 6 篇 vulnerability
  • 5 篇 cyberattack
  • 5 篇 plc
  • 5 篇 anomaly detectio...
  • 5 篇 industrial contr...
  • 4 篇 deep learning

机构

  • 3 篇 univ nebraska li...
  • 2 篇 dept. of general...
  • 2 篇 massachusetts in...
  • 2 篇 tata consultancy...
  • 2 篇 brno university ...
  • 2 篇 cardiff univ sch...
  • 2 篇 dept. of electri...
  • 2 篇 atkins epsom sur...
  • 2 篇 dept. of creativ...
  • 1 篇 univ sains malay...
  • 1 篇 management depar...
  • 1 篇 jackson state un...
  • 1 篇 phd program pros...
  • 1 篇 singapore univ t...
  • 1 篇 isfmt inc august...
  • 1 篇 univ toronto on
  • 1 篇 department of co...
  • 1 篇 danube univ krem...
  • 1 篇 rhein westfal th...
  • 1 篇 secura eindhoven

作者

  • 3 篇 sharif hamid
  • 3 篇 boeding matthew
  • 3 篇 hempel michael
  • 2 篇 misurec jiri
  • 2 篇 sanner scott
  • 2 篇 pan lei
  • 2 篇 baig zubair
  • 2 篇 nosouhi mohammad...
  • 2 篇 hutchison david
  • 2 篇 sato jun
  • 2 篇 rana omer
  • 2 篇 rashid awais
  • 2 篇 jahromi amir abi...
  • 2 篇 green benjamin
  • 2 篇 pati debi prasad
  • 2 篇 saxena neetesh
  • 2 篇 sood keshav
  • 2 篇 fujdiak radek
  • 2 篇 r. piggin
  • 2 篇 kundur deepa

语言

  • 112 篇 英文
  • 1 篇 其他
检索条件"主题词=Operational Technology"
113 条 记 录,以下是1-10 订阅
排序:
Usage of Cybersecurity Standards in operational technology Systems  19th
Usage of Cybersecurity Standards in Operational Technology...
收藏 引用
19th International Workshop on Data Privacy Management, DPM 2024, 8th International Workshop on Cryptocurrencies and Blockchain technology, CBT 2024 and 10th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in Computer Security, ESORICS 2024
作者: Kannelønning, Kristian Katsikas, Sokratis Department of Information Security and Communication Technology NTNU - Norwegian University of Science and Technology Postboks 191 Gjøvik2802 Norway
The escalating frequency of cyber attacks against industrial installations over the past decade underscores the growing imperative to fortify cybersecurity in organizations. The advent of Industry 4.0 has interconnect... 详细信息
来源: 评论
End-to-End Framework for Identifying Vulnerabilities of operational technology Protocols and Their Implementations in Industrial IoT
收藏 引用
FUTURE INTERNET 2025年 第1期17卷
作者: Boeding, Matthew Hempel, Michael Sharif, Hamid Univ Nebraska Lincoln Dept Elect & Comp Engn Lincoln NE 68588 USA
The convergence of IT and OT networks has gained significant attention in recent years, facilitated by the increase in distributed computing capabilities, the widespread deployment of Internet of Things devices, and t... 详细信息
来源: 评论
A Systematic Literature Review of Current Research Trends in operational and Related technology Threats, Threat Detection, and Security Insurance
收藏 引用
APPLIED SCIENCES-BASEL 2025年 第5期15卷
作者: Goranin, Nikolaj Ceponis, Dainius Cenys, Antanas Vilnius Gediminas Tech Univ Dept Informat Syst LT-10223 Vilnius Lithuania
The expansion of operation technology (OT) use and its tight integration with classical information and communication technologies have led not only to additional and improved possibilities in monitoring physical/manu... 详细信息
来源: 评论
HELOT-Hunting Evil Life in operational technology
收藏 引用
IEEE TRANSACTIONS ON SMART GRID 2023年 第4期14卷 3058-3071页
作者: Akailvi, Syed Gautam, Uddhav Bhandari, Praveshika Rashid, Hadi Huff, Philip D. D. Springer, Jan P. P. UA Little Rock Dept Comp Sci Little Rock AR 72224 USA UA Little Rock Emerging Analyt Ctr Little Rock AR 72224 USA
operational technology (OT) refers to the industrial counterpart of information technology (IT). OT encompasses technology, systems, and protocols used in industrial operations for controlling, monitoring, and operati... 详细信息
来源: 评论
An Analysis of Adversary-Centric Security Testing within Information and operational technology Environments
收藏 引用
DIGITAL THREATS: RESEARCH AND PRACTICE 2023年 第1期4卷 1-29页
作者: Staves, Alexander Gouglidis, Antonios Hutchison, David Univ Lancaster Lancaster LA1 4WA England
Assurance techniques such as adversary-centric security testing are an essential part of the risk assessment process for improving risk mitigation and response capabilities against cyber attacks. While the use of thes... 详细信息
来源: 评论
Leveraging operational technology and the Internet of things to attack smart buildings
收藏 引用
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES 2021年 第1期17卷 1-20页
作者: dos Santos, Daniel Ricardo Dagrada, Mario Costante, Elisa Forescout Technol John F Kennedylaan 2 NL-5612 AB Eindhoven Netherlands
In recent years, the buildings where we spend most part of our life are rapidly evolving. They are becoming fully automated environments where energy consumption, access control, heating and many other subsystems are ... 详细信息
来源: 评论
Information-Centric Adoption and Use of Standard Compliant DevSecOps for operational technology: From Experience to Design Principles  14th
Information-Centric Adoption and Use of Standard Compliant D...
收藏 引用
14th International Conference on Software Business (ICSOB)
作者: Haverinen, Henry Paivarinta, Tero Vanska, Jussi Joutsijoki, Henry Cyberismo Oy Saarikonkuja 26 Lempaala 37500 Finland Univ Oulu Fac Informat Technol & Elect Engn M3S Oulu Finland Valmet Automat Oy Lentokentankatu 11 Tampere 33900 Finland Insta Automat Oy Sarankulmankatu 20 Tampere 33900 Finland
Secure and agile development of operational technology (OT) and related software in industry is a crucial but challenging issue. Generally recognized standards such as IEC 62443-4-1 set up the requirements for cyberse... 详细信息
来源: 评论
Understanding operational technology Personnel's Mindsets and their Effect on Cybersecurity Perceptions: A Qualitative Study with operational technology Cybersecurity Practitioners  24
Understanding Operational Technology Personnel's Mindsets an...
收藏 引用
4th European Symposium on Usable Security
作者: Eviripidrou, Stefanos Watson, Jeremy Daniel McKendrick UCL Ctrr Doctrol Training Cybersecur London WC1E 6BT England UCL Dept Sci Technol Engn & Pub Policy STEaPP London England
operational technology (OT) is hardware and software that monitor and control industrial processes in sectors such as water and energy. OT's increased digitalisation which expanded its attack surface, heightened i... 详细信息
来源: 评论
Reconfigurable Network Slicing Orchestration in Network Function Virtualization Compatible operational technology Environment
Reconfigurable Network Slicing Orchestration in Network Func...
收藏 引用
2024 International Conference on Communications Control and Computing Technologies for Smart Grids
作者: Delgado, Brian G. Kodiles Aguayo, Jared M. Rivera, Abel O. Gomez Tosh, Deepak K. Univ Texas El Paso Dept Comp Sci El Paso TX 79968 USA Johns Hopkins Univ Appl Phys Lab Laurel MD USA Sandia Natl Labs Albuquerque NM USA
The ongoing transition to Industry 4.0, which is characterized by increased inter-connectivity of cyber-physical systems, requires having time-sensitive, high throughput, and secure transfer of critical data in indust... 详细信息
来源: 评论
Anomaly Detection in operational technology Systems using Non-Intrusive Load Monitoring Based on Supervised Learning
Anomaly Detection in Operational Technology Systems using No...
收藏 引用
4th IEEE Annual International Conference on Cyber Security and Resilience (IEEE CSR)
作者: Schroeder, A. McClure, P. Thulasiraman, P. Naval Postgrad Sch Monterey CA 93943 USA
When using operational technology (OT) across critical infrastructures, including Naval installations, it is important to implement robust anomaly detection mechanisms. Using non-intrusive load monitoring (NILM) techn... 详细信息
来源: 评论