2017 2nd International Conference on Anti-Cyber Crimes (ICACC) 2017
DOI: 10.1109/anti-cybercrime.2017.7905262
|View full text |Cite
|
Sign up to set email alerts
|

Security threat identification using energy points

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…In general, cyber threats can be of various kinds: malware, phishing and spear phishing, man-in-the-middle attacks, trojans, ransomware, denial or distributed denial of service attacks, attacks on IoT devices, data breaches, etc. All of these are related to Industry 4.0 at various degrees and also ways of fighting them are quite diverse [141,[144][145][146]. These security threats are one of the biggest and evergrowing challenges for IIoT, and it is essential to substantially mitigate them for its success [147].…”
Section: E91 Threat Identification and Detectionmentioning
confidence: 99%
“…In general, cyber threats can be of various kinds: malware, phishing and spear phishing, man-in-the-middle attacks, trojans, ransomware, denial or distributed denial of service attacks, attacks on IoT devices, data breaches, etc. All of these are related to Industry 4.0 at various degrees and also ways of fighting them are quite diverse [141,[144][145][146]. These security threats are one of the biggest and evergrowing challenges for IIoT, and it is essential to substantially mitigate them for its success [147].…”
Section: E91 Threat Identification and Detectionmentioning
confidence: 99%
“…In [61] paper, the authors explained that it is necessary to create security of the system in the early Phases of the software Cycle of Software Development since each year, large amount of money are lost because of bugs in software security caused by inadequate or incorrect security processes. Numerous breaches of security happen on software systems.…”
Section: Threat Identificationmentioning
confidence: 99%
“…Numerous breaches of security happen on software systems. Many solutions have been suggested in the scientific literature to solve security issues [61].…”
Section: Threat Identificationmentioning
confidence: 99%