Detection of Information Security Breaches in a Digital Production System Based on the Component Interaction Model

被引:0
|
作者
E. Yu. Pavlenko
机构
[1] Peter the Great St. Petersburg Polytechnic University,
关键词
information security; breach detection; cybersecurity; digital production;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1020 / 1022
页数:2
相关论文
共 50 条
  • [31] On The Detection and Handling of Security Incidents and Perimeter Breaches - A Modular and Flexible Honeytoken based Framework
    Fraunholz, Daniel
    Krohmer, Daniel
    Pohl, Frederic
    Schotten, Hans Dieter
    2018 9TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2018,
  • [32] Detection of Geographic Information System Security Hazards in the IoT Based on Network Security Situation Awareness
    Wang, Ben
    Zhao, Qing
    Wei, Guichen
    JOURNAL OF TESTING AND EVALUATION, 2024, 52 (03) : 1515 - 1526
  • [33] Distributed intrusion detection system based on grid security model
    Su, Jie
    Liu, Yahui
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2008, 2008, 6973
  • [34] Construction of Information System Security Precaution in Digital Library
    Wan, Xuemei
    3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS FOR CRISIS RESPONSE AND MANAGEMENT & 4TH INTERNATIONAL SYMPOSIUM ON GEO-INFORMATION FOR DISASTER MANAGEMENT, 2008, : 263 - 268
  • [35] INFORMATION SECURITY MANAGEMENT SYSTEM AND DIGITAL FORENSIC ANALYSIS
    Holoska, Jiri
    Doucek, Petr
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE: LIBEREC INFORMATICS FORUM 2016, 2016, : 27 - 34
  • [36] Component based simulator of digital system
    Senczyna, S.
    MIXDES 2008: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON MIXED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2008, : 395 - 400
  • [37] BLP-based information security model in secure operating system
    Huang, Yimin
    Wang, Weizhen
    Jisuanji Gongcheng/Computer Engineering, 2005, 31 (19): : 133 - 135
  • [38] Matrix correction method based information system security assessment model
    Yang H.
    Zhang X.
    Lu W.
    1600, Tsinghua University (60): : 393 - 401
  • [39] Configurable integrated maintenance system based on digital production model
    Li, Peng
    Sun, Yonggang
    Shi, Haibo
    Shang, Wenli
    2010 CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-5, 2010, : 1289 - +
  • [40] Information security defense method of electric power control system based on digital watermark
    Zhou, Chao
    Guo, Yajuan
    Huang, Wei
    Jiang, Haitao
    Li, Bin
    Chen, Jinming
    PROCEEDINGS OF THE 2016 3RD INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING, MANUFACTURING TECHNOLOGY AND CONTROL, 2016, 67 : 174 - 179