暂无分享,去创建一个
Pete Burnap | Jason R. C. Nurse | Eirini Anthi | Omar Santos | Petar Radanliev | Uchenna Ani | Rafael Mantilla Montalvo | La Treall Maddox | David Charles De Roure
[1] C. Fung,et al. Value analysis of cyber security based on attack types , 2015 .
[2] Michael Huth,et al. Future Developments in Cyber Risk Assessment for the Internet of Things , 2018, Comput. Ind..
[3] Petar Radanliev,et al. Engineering Design Methodology for Green-Field Supply Chain Architectures Taxonomic Scheme , 2015 .
[4] Lawrence A. Gordon,et al. The economics of information security investment , 2002, TSEC.
[5] Paulo Leitão,et al. Industrial automation based on cyber-physical systems technologies: Prototype implementations and challenges , 2016, Comput. Ind..
[6] Anne Marsden,et al. International Organization for Standardization , 2014 .
[7] Pengcheng Zhang,et al. A generalized modeling framework to analyze interdependencies among infrastructure systems , 2011 .
[8] Joseph Lindley,et al. Internet of Things: realising the potential of a trusted smart world , 2018 .
[9] Alberto L. Sangiovanni-Vincentelli,et al. Taming Dr. Frankenstein: Contract-Based Design for Cyber-Physical Systems , 2012, Eur. J. Control.
[10] Petar Radanliev,et al. Economic impact of IoT cyber risk - Analysing past and present to predict the future developments in IoT risk analysis and IoT cyber insurance , 2018, IoT 2018.
[11] Peter Burnap,et al. Methodology for Designing Decision Support Systems for Visualising and Mitigating Supply Chain Cyber Risk from IoT Technologies , 2019, ArXiv.
[12] Kenneth M. Hanson,et al. THE BAYES INFERENCE ENGINE , 1996 .
[13] David De Roure,et al. Integration of Cyber Security Frameworks‚ Models and Approaches for Building Design Principles for the Internet−of−Things in Industry 4.0 , 2018, IoT 2018.
[14] Petar Radanliev,et al. Supply Chain Paradox: Green-field Architecture for Sustainable Strategy Formulation , 2015 .
[15] Sadie Creese,et al. If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems , 2018, IoT 2018.
[16] Eirini Anthi,et al. Definition of Internet of Things (IoT) Cyber Risk – Discussion on a Transformation Roadmap for Standardisation of Regulations, Risk Maturity, Strategy Design and Impact Assessment , 2019 .
[17] Peter C. Evans,et al. Industrial Internet: Pushing the Boundaries of Minds and Machines , 2012 .
[18] Muhammad Bilal,et al. A Review of Internet of Things Architecture, Technologies and Analysis Smartphone-based Attacks Against 3D printers , 2017, ArXiv.
[19] Michael Huth,et al. Mapping the values of IoT , 2018, J. Inf. Technol..
[20] Sadie Creese,et al. Sonification in security operations centres: what do security practitioners think? , 2018, ArXiv.
[21] Lihui Wang,et al. Current status and advancement of cyber-physical systems in manufacturing , 2015 .
[22] Petar Radanliev,et al. Green-Field Architecture for Sustainable Supply Chain Strategy Formulation , 2015 .
[23] Josune Hernantes,et al. Critical infrastructure dependencies: A holistic, dynamic and quantitative approach , 2015, Int. J. Crit. Infrastructure Prot..
[24] Martin D. Weinberg,et al. Computational statistics using the Bayesian Inference Engine , 2012, 1203.3816.
[25] Petar Radanliev,et al. Architectures for Green-Field Supply Chain Integration: Supply Chain Integration Design , 2015 .
[26] Michael Huth,et al. Cyber Risk impact Assessment - Assessing the Risk from the IoT to the Digital Economy , 2019 .
[27] Petar Radanliev. A conceptual framework for supply : supply chain systems architecture and integration design based on practice and theory in the North Wales slate mining industry , 2014 .
[28] Michael Huth,et al. A reference architecture for integrating the Industrial Internet of Things in the Industry 4.0 , 2019, ArXiv.
[29] Larry Feldman,et al. The Cybersecurity Framework: Implementation Guidance for Federal Agencies , 2017 .
[30] Keyun Ruan,et al. Introducing cybernomics: A unifying economic framework for measuring cyber risk , 2017, Comput. Secur..
[31] Panayiotis Kotzanikolaou,et al. Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures , 2016, Int. J. Crit. Infrastructure Prot..
[32] Zachary A. Collier,et al. Systems engineering framework for cyber physical security and resilience , 2015, Environment Systems and Decisions.
[33] Petar Radanliev,et al. Supply Chain Systems Architecture and Engineering Design: Green-Field Supply Chain Integration , 2015 .
[34] G. Rodewald.. Aligning information security investments with a firm's risk tolerance , 2005, InfoSecCD '05.
[35] David Wright,et al. Stochastic Modelling of the Effects of Interdependencies between Critical Infrastructure , 2009, CRITIS.
[36] Sadie Creese,et al. Security Risk Assessment in Internet of Things Systems , 2017, IT Professional.
[37] Jason R. C. Nurse,et al. Insider threat response and recovery strategies in financial services firms , 2016 .
[38] Tyler Moore,et al. The Economics of Information Security , 2006, Science.