Critical infrastructure protection

Results: 2523



#Item
51Mitch.Komaroff.CONOPS Nov 06 Overview.ppt

Mitch.Komaroff.CONOPS Nov 06 Overview.ppt

Add to Reading List

Source URL: swa.omg.org

Language: English - Date: 2006-12-14 08:55:32
52Cyber-Critical Infrastructure Protection Using Real-time Payload-based Anomaly Detection * Patrick D¨ ussel1 , Christian Gehl1 , Pavel Laskov1,2 Jens-Uwe Bußer3 , Christof St¨ormann3 and Jan K¨

Cyber-Critical Infrastructure Protection Using Real-time Payload-based Anomaly Detection * Patrick D¨ ussel1 , Christian Gehl1 , Pavel Laskov1,2 Jens-Uwe Bußer3 , Christof St¨ormann3 and Jan K¨

Add to Reading List

Source URL: www-rsec.cs.uni-tuebingen.de

Language: English - Date: 2010-03-31 08:17:28
    53Microsoft Word - ENoriginal.doc

    Microsoft Word - ENoriginal.doc

    Add to Reading List

    Source URL: www.cockpitci.eu

    Language: English - Date: 2014-03-25 07:46:06
    54EUROPEAN COMMISSION Brussels, SWDfinal

    EUROPEAN COMMISSION Brussels, SWDfinal

    Add to Reading List

    Source URL: www.cockpitci.eu

    Language: English
    55122 FERC ¶ 61,040 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION 18 CFR Part 40 [Docket No. RM06; Order NoMandatory Reliability Standards for Critical Infrastructure Protection

    122 FERC ¶ 61,040 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION 18 CFR Part 40 [Docket No. RM06; Order NoMandatory Reliability Standards for Critical Infrastructure Protection

    Add to Reading List

    Source URL: force5solutions.com

    Language: English - Date: 2014-11-10 14:30:55
    56

    PDF Document

    Add to Reading List

    Source URL: www.cockpitci.eu

    Language: English - Date: 2014-03-25 07:46:04
    57METHODOLOGY AND CRITERIA FOR THE CYBERSECURITY REPORTS The cybersecurity maturity has been assessed against 25 criteria across five themes. Each of the criteria are given a “Yes”, “No”, “Partial”, or “Not A

    METHODOLOGY AND CRITERIA FOR THE CYBERSECURITY REPORTS The cybersecurity maturity has been assessed against 25 criteria across five themes. Each of the criteria are given a “Yes”, “No”, “Partial”, or “Not A

    Add to Reading List

    Source URL: cybersecurity.bsa.org

    Language: English - Date: 2015-02-26 18:08:29
    58EU Agency analysis of ‘Stuxnet’ malware: a paradigm shift in threats and Critical Information Infrastructure Protection — ENISA

    EU Agency analysis of ‘Stuxnet’ malware: a paradigm shift in threats and Critical Information Infrastructure Protection — ENISA

    Add to Reading List

    Source URL: www.cockpitci.eu

    - Date: 2014-03-25 07:46:52
      59Transport Infrastructure Investment: Capturing the Wider Benefits of Investment in Transport

      Transport Infrastructure Investment: Capturing the Wider Benefits of Investment in Transport

      Add to Reading List

      Source URL: rtpi.org.uk

      Language: English - Date: 2014-01-14 08:03:42
      60ThetaRay_Logo_Options_Draft7

      ThetaRay_Logo_Options_Draft7

      Add to Reading List

      Source URL: www.thetaray.com

      Language: English - Date: 2014-12-06 19:30:32