Cyber Security of Critical Infrastructures


English[eng]

9783040000000


crypto-ransomware||locker-ransomware||static analysis||dynamic analysis||machine learning||assessment framework||cybersecurity||GDPR||PCI-DSS||DSPT||NISD||cyber-ranges||security training||security modelling||serious games||dynamic adaptation||training programmes||computers in education||bloom||STRIDE||smart shipping||military||VMF||hash chain||T-OTP||lightweight secure hash (LSH)||CNR||web application||security vulnerability||analysis security testing||static analysis security testing||dynamic analysis security testing||interactive analysis security testing||assessment methodology||false positive||false negative||tools combination||deep learning||image classification||transfer learning||industrial control system||fine-tuning||testbeds||cyber ranges||cyber exercises||education||training||research||lattice cryptography||code cryptography||post quantum cryptography||physical unclonable function||public key infrastructure||high performance computing||malware analysis||static malware analysis||dynamic malware analysis||malware classification||random forest||support vector machines||smart grid||risk assessment||threat modeling||formal verification||probabilistic model checking||cloud robotics||image face recognition||deep learning algorithms||security||encryption algorithms||cybercrime||Hasse diagram||interval-valued complex intuitionistic fuzzy relations||interval-valued complex intuitionistic fuzzy sets||offensive cybersecurity||cyber-attacks||scoring model||offensive cybersecurity framework||n/a