Please use this identifier to cite or link to this item:
https://dspace.ncfu.ru/handle/20.500.12258/25831Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Lapina, M. A. | - |
| dc.contributor.author | Лапина, М. А. | - |
| dc.date.accessioned | 2023-11-21T14:33:22Z | - |
| dc.date.available | 2023-11-21T14:33:22Z | - |
| dc.date.issued | 2023 | - |
| dc.identifier.citation | Basan, E., Peskova, O., Lapina, M., Sajid, M. Automation of the Process of Analysis of Information Security Threats in Cyber-Physical Systems // Intelligent Techniques for Cyber-Physical Systems. - 2023. - pp. 91-107. - DOI: 10.1201/9781003438588-6 | ru |
| dc.identifier.uri | http://hdl.handle.net/20.500.12258/25831 | - |
| dc.description.abstract | This chapter describes a technique for automating the procedure of analyzing security threats in cyber-physical systems. The presented methodology is based on the study of the system architecture, the attacker’s competences, and the probable risks of threats. The approaches to assessing the levels of criticality and heterogeneity, the complexity of the implementation of the attack, the degree of negative consequences of the threat, as well as determining the value of an information resource are described. The presented technology is based on organizing information about the architectural structures of cyber-physical systems. Organizing information and presenting it in the form of interconnected catalogs makes it possible to compile the list of threats, vulnerabilities, and attacks related to it based on structural and functional characteristics. The developed base and catalog of cyber-physical system threats are presented. When conniving catalogs, an ontological method was used, which allows defining and linking concepts and their possessions. | ru |
| dc.language.iso | en | ru |
| dc.relation.ispartofseries | Intelligent Techniques for Cyber-Physical Systems | - |
| dc.subject | Cyber-physical systems | ru |
| dc.subject | Information security | ru |
| dc.subject | Analysis of information security threats | ru |
| dc.title | Automation of the Process of Analysis of Information Security Threats in Cyber-Physical Systems | ru |
| dc.type | Статья | ru |
| vkr.inst | Институт цифрового развития | ru |
| Appears in Collections: | Статьи, проиндексированные в SCOPUS, WOS | |
Files in This Item:
| File | Size | Format | |
|---|---|---|---|
| scopusresults 2825 .pdf Restricted Access | 131.61 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.