Detection of Information Security Breaches in a Digital Production System Based on the Component Interaction Model

被引:0
|
作者
E. Yu. Pavlenko
机构
[1] Peter the Great St. Petersburg Polytechnic University,
关键词
information security; breach detection; cybersecurity; digital production;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1020 / 1022
页数:2
相关论文
共 50 条
  • [21] Evaluating the Network and Information System Security Based on SVM Model
    Yang, Shaomei
    Liu, Donglei
    Liu, Zhibin
    JOURNAL OF COMPUTERS, 2009, 4 (11) : 1145 - 1150
  • [22] Model of information system security based on SVRM and rough set
    Che, Cheng
    Tang, Shoulian
    Information, Management and Algorithms, Vol II, 2007, : 57 - 60
  • [23] An Information System Security Evaluation Model Based on AHP and GRAP
    Xu Cuihua
    Lin Jiajun
    WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, : 493 - 496
  • [24] An Application Security Model Based on Business Process in Information System
    Xu, Peng
    Chen, Meirong
    Feng, Lifang
    Wu, Guanfeng
    Ma, Fangli
    Wang, Danchen
    2017 12TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND KNOWLEDGE ENGINEERING (IEEE ISKE), 2017,
  • [25] Digital media system design and visual art analysis based on information security
    Li K.
    Measurement: Sensors, 2024, 31
  • [26] Application of hospital information security based on Intelligent Intrusion Detection System
    Li, Xingshan
    Zhang, Yifan
    Xu, Min
    PROCEEDINGS OF THE 2016 7TH INTERNATIONAL CONFERENCE ON MECHATRONICS, CONTROL AND MATERIALS (ICMCM 2016), 2016, 104 : 412 - 416
  • [27] The information model of the modern digital production
    Kapitanov, Alexey
    Kozlova, Aleksandra
    Tyasto, Sergey
    INTERNATIONAL CONFERENCE ON MODERN TRENDS IN MANUFACTURING TECHNOLOGIES AND EQUIPMENT (ICMTMTE 2018), 2018, 224
  • [28] The Proposed Design of the Monitoring System for Security Breaches of Buildings Based on Behavioral Tracking
    Rahma, Abdul Monem S.
    Jamil, Abeer Salim
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (07): : 37 - 40
  • [29] Research of Information System Security Risk Management based on Probability Model and Security Entropy
    Du, Jiawei
    Zhou, Ying
    Guo, Ronghua
    Zhang, Xing
    Suo, Guowei
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE), 2017, 190 : 414 - 420
  • [30] Research on information security model and security system design
    Huang, Yi-Min
    Ping, Ling-Di
    Pan, Xue-Zeng
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2001, 35 (06): : 603 - 607