How Collaborative Research Bolsters Utility Cyber Security

被引:0
|
作者
Warren, Chris
机构
来源
EPRI Journal | 2024年 / 03期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:27 / 30
相关论文
共 50 条
  • [21] How does intellectual capital align with cyber security?
    Renaud, Karen
    Von Solms, Basie
    Von Solms, Rossouw
    JOURNAL OF INTELLECTUAL CAPITAL, 2019, 20 (05) : 621 - 641
  • [22] Cross-Domain Situational Awareness and Collaborative Working for Cyber Security
    Hall, Mark John
    Hansen, Devon David
    Jones, Kevin
    2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2015,
  • [23] Poster: The Need for a Collaborative Approach to Cyber Security Education<bold> </bold>
    Langner, Gregor
    Andriessen, Jerry
    Quirchmayr, Gerald
    Furnell, Steven
    Scarano, Vittorio
    Tokola, Teemu Johannes
    2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2021), 2021, : 719 - 721
  • [24] Foundations for Collaborative Cyber Security Learning: Exploring Educator and Learner Requirements
    Andriessen, Jerry
    Furnell, Steven
    Langner, Gregor
    Quirchmayr, Gerald
    Scarano, Vittorio
    Tokola, Teemu
    INFORMATION SECURITY EDUCATION FOR CYBER RESILIENCE, WISE 2021, 2021, 615 : 143 - 145
  • [25] Cyber-Physical Operation Security with a Collaborative Knowledge Grid System
    Das, Asesh
    Reddy, Ramana
    Wang, Luyi
    Reddy, Sumitra
    2012 PROCEEDINGS OF IEEE SOUTHEASTCON, 2012,
  • [26] Security framework for industrial collaborative robotic cyber-physical systems
    Khalid, Azfar
    Kirisci, Pierre
    Khan, Zeashan Hameed
    Ghrairi, Zied
    Thoben, Klaus-Dieter
    Pannek, Juergen
    COMPUTERS IN INDUSTRY, 2018, 97 : 132 - 145
  • [27] HOW TO DO COLLABORATIVE RESEARCH
    WILLIAMS, WO
    BRITISH MEDICAL JOURNAL, 1982, 285 (6340): : 480 - 482
  • [28] How to Operationalise Collaborative Research
    Jones, Elizabeth A.
    Westin, Anna
    Madry, Scott
    Murray, Seth
    Moen, Jon
    Tickner, Amanda
    ISSUES AND CONCEPTS IN HISTORICAL ECOLOGY: THE PAST AND FUTURE OF LANDSCAPES AND REGIONS, 2018, : 240 - 271
  • [29] Towards Cyber Security Risks Assessment in Electric Utility SCADA Systems
    Woo, Pil Sung
    Kim, Balho H.
    Hur, Don
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2015, 10 (03) : 888 - 894
  • [30] Critical infrastructures—cyber security requirements from a utility’s perspective
    Kleineidam G.
    Schmid L.J.
    Krasser M.
    Koch B.
    Kleineidam, Gerhard (gerhard.kleineidam@uni-bayreuth.de), 1600, Springer-Verlag Wien (134): : 3 - 13