Critical infrastructure

Results: 3394



#Item
101

Solution Brief: Rail & Railroads Securing and Connecting Critical Infrastructure for Rail Carriers To improve safety and operational efficiency, rail carriers are increasing connectivity and automation through intelligen

Add to Reading List

Source URL: www.temperednetworks.com

Language: English - Date: 2015-12-23 14:06:25
    102Prevention / United States Department of Homeland Security / Safety / Engineering / Infrastructure / Dependability / Quality / Safety engineering / Critical infrastructure / Reliability engineering

    ReSA4CI 2015: The 2nd International Workshop on Reliability and Security Aspects for Critical Infrastructure Protection Workshop Programme September 22, 2015 Delft, The Netherlands

    Add to Reading List

    Source URL: safecomp2015.tudelft.nl

    Language: English - Date: 2015-09-03 11:54:38
    103

    Bypassing McAfee’s Application Whitelisting for Critical Infrastructure Systems Version: V1.0 | Date: Author: | Responsible: René Freingruber - SEC Consult Vulnerability Lab, Vienna Confidentiality Class: P

    Add to Reading List

    Source URL: www.exploit-db.com

    Language: English - Date: 2016-01-12 10:34:02
      104Electric power distribution / Electric power / Smart grid / Public services / Emerging technologies / Smart meter / Automatic meter reading / Meter data management / ANSI C12.22 / Electricity meter / Computer security / Electrical grid

      CERTICOM WHITEPAPER SERIES Critical Infrastructure Protection for AMI Using a Comprehensive Security Platform February 2009

      Add to Reading List

      Source URL: www.certicom.com

      Language: English - Date: 2010-10-20 19:21:13
      105

      For Critical Infrastructure—Buildings Myth: You are protected from an active shooter attack while at work in your office building, or in a shopping mall.

      Add to Reading List

      Source URL: shotspotter.com

      Language: English - Date: 2014-12-15 20:28:45
        106Computer security / Security / Computer network security / Computing / Software testing / Codenomicon / Coriant / Vulnerability management

        Creating Trust with Coriant Power suppliers, critical infrastructure providers, and network builders all operate in an unsafe world, where cyber attacks and network malfunctions can disrupt services. Coriant’s customer

        Add to Reading List

        Source URL: www.codenomicon.com

        Language: English - Date: 2016-03-02 04:58:14
        107Security / Economic systems / Actuarial science / World economy / Management / Risk / Systemic risk / Financial crisis of 200708 / Global financial system / Resilience / Critical infrastructure protection / Climate change and poverty

        OECD Reviews of Risk Management Policies Future Global Shocks IMPROVING RISK GOVERNANCE © iStockphoto/Stephan Zabel

        Add to Reading List

        Source URL: www.mmc.com

        Language: English - Date: 2016-01-28 13:50:06
        108

        Security Economics and Critical National Infrastructure Ross Anderson, Shailendra Fuloria Cambridge University Computer Laboratory

        Add to Reading List

        Source URL: weis09.infosecon.net

        Language: English - Date: 2013-09-01 23:23:37
          109

          Active Shooter Scenario Gunfire Alert and Detection Response Conceptual foundations and performance requirements for mitigating indoor and outdoor active shooter threats to critical infrastructure and vulnerable targets

          Add to Reading List

          Source URL: www.shotspotter.com

          Language: English - Date: 2014-09-10 21:31:23
            110Infrastructure / United States Department of Homeland Security / Federal Emergency Management Agency / HAZUS / OpenStreetMap / Critical infrastructure / Oncostatin M / Technology / Government / Science and technology

            ISCRAM2015_Conference_PaperTemplate.docx

            Add to Reading List

            Source URL: www.agora.icmc.usp.br

            Language: English - Date: 2015-04-13 14:27:45
            UPDATE