How Collaborative Research Bolsters Utility Cyber Security

被引:0
|
作者
Warren, Chris
机构
来源
EPRI Journal | 2024年 / 03期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:27 / 30
相关论文
共 50 条
  • [11] Security operation modes for enhancement of utility computer network cyber-security
    Wang, Lin
    Mander, Todd
    Cheung, Helen
    Nabhani, Farhad
    Cheung, Richard
    2007 IEEE POWER ENGINEERING SOCIETY GENERAL MEETING, VOLS 1-10, 2007, : 4316 - +
  • [12] The Utility of Collaborative Biobanks for Cardiovascular Research
    Shalhoub, Joseph
    Davies, Kerry J.
    Hasan, Nazeeha
    Thapar, Ankur
    Sharma, Pankaj
    Davies, Alun H.
    ANGIOLOGY, 2012, 63 (05) : 367 - 377
  • [13] European Cyber-Security Research and Innovation
    Maggi, Federico
    Zanero, Stefano
    Markatos, Evangelos
    ERCIM NEWS, 2015, (100): : 43 - 43
  • [14] The Trend of the Security Research for the Insider Cyber Threat
    Hong, Jaeseung
    Kim, Jongwung
    Cho, Jeonghun
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2010, 4 (03): : 55 - 63
  • [15] The Trend of the Security Research for the Insider Cyber Threat
    Hong, Jaeseung
    Kim, Jongwung
    Cho, Jeonghun
    SECURITY TECHNOLOGY, PROCEEDINGS, 2009, 58 : 100 - 107
  • [16] The Trend of the Security Research for the Insider Cyber Threat
    Hong, Jaeseung
    Kim, Jongwung
    Cho, Jeonghun
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2010, 3 (02): : 31 - 40
  • [17] Reporting a Cyber Security Breach: How Organizations Respond
    Naidoo, Jef
    Dulek, Ron
    Butler, Seth
    Baily, Brooke
    INTERNATIONAL JOURNAL OF BUSINESS COMMUNICATION, 2024,
  • [18] Maritime Cyber Security Analysis - How to Reduce Threats?
    Mrakovic, Ivan
    Vojinovic, Ranko
    TRANSACTIONS ON MARITIME SCIENCE-TOMS, 2019, 8 (01): : 132 - 139
  • [19] How deception can change cyber security defences
    Bushby A.
    Computer Fraud and Security, 2019, 2019 (01): : 12 - 14
  • [20] Cyber Security - How Visual Analytics Unlock Insight
    Marty, Raffael
    19TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (KDD'13), 2013, : 1139 - 1139