2019 Systems of Signals Generating and Processing in the Field of on Board Communications 2019
DOI: 10.1109/sosg.2019.8706821
|View full text |Cite
|
Sign up to set email alerts
|

Critical Infrastructure Security: Alignment of Views

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…To achieve customized production and quality milestones, automation and remote control are considered as most crucial methods in an Industry 4.0 factory (Mikhalevich and Trapeznikov, 2019). This system requires efficient management of IoT systems consisting of maximum accuracy, security, and reliability.…”
Section: Cyber Threats and Possible Solutionsmentioning
confidence: 99%
“…To achieve customized production and quality milestones, automation and remote control are considered as most crucial methods in an Industry 4.0 factory (Mikhalevich and Trapeznikov, 2019). This system requires efficient management of IoT systems consisting of maximum accuracy, security, and reliability.…”
Section: Cyber Threats and Possible Solutionsmentioning
confidence: 99%
“…Automation and remote control are today the most important methods by which critical infrastructures [42] improve the productivity and quality of their services. Under this spectrum, the efficient management of IIoT systems requires maximum accuracy, reliability, and security.…”
Section: Cyber Threats and Its Countermeasuresmentioning
confidence: 99%
“…Moreover, clinical IT infrastructure is sensible and, thus, presumed to be highly secure. Consequently, wireless and even cable-based connections of unknown devices to computers in the hospital network are mostly blocked as those interfaces are prone to be attacked [33,34]. Faceto-face authentication and authorization processes in person VOLUME 4, 2016 are the significant aspects of this protocol.…”
Section: B Face-to-face Data Transfermentioning
confidence: 99%