Protecting water and wastewater utilities from cyber‐physical threats

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protecting the Nation from Health Security Threats

Events in the United States and internationally have shown the kinds of great stakes and consequences that often follow epidemics and disasters. Consider the series of health security shocks since 2001: National fear during the anthrax letters events, with impact on all 3 branches of the US government. The respiratory transmissible SARS and MERS viruses spreading via airplanes and hospitals, so...

متن کامل

Protecting the FPGA Design From Common Threats

The global estimated loss to counterfeiting is expected to exceed U.S.$1.5 trillion in 2009. Counterfeiting impacts all businesses in all markets, from Gucci handbags to computer chips to proprietary algorithms. The threats to companies’ intellectual property (IP) grow as the global supply chain becomes increasingly complex. Security and protection in the global supply chain is critical to main...

متن کامل

Protecting Infrastructure Assets from Real-Time and Run-Time Threats

Real-time availability with integrity is a crucial security requirement for critical infrastructure assets – delays in reporting device states or computations may result in equipment damage, perhaps even catastrophic failure. However, it is also necessary to address malicious software-based threats. Trusted computing (TC) is a security paradigm that enables application platforms to enforce the ...

متن کامل

Protecting information systems from insider threats - concepts and issues

Keynote abstract Past research on information security has focused on protecting valuable resources from attacks by outsiders. However, statistics show that a large amount of security and privacy breaches are due to insider attacks. Protection from insider threats is challenging because insiders may have access to many sensitive resources and high-privileged system accounts. Suitable approaches...

متن کامل

Protecting Against Unsampled Ionospheric Threats

Nominally, the mid-latitude ionosphere sampled by WAAS is smooth and slowly varying. However, during ionospheric storms, small-scale irregularities may form. These irregularities cause rapid changes in Total Electron Content (TEC) over comparatively short distances. WAAS has observed changes greater than 20 meters of vertical delay at the GPS L1 frequency over a few hundred kilometers. Such fea...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Water and Environment Journal

سال: 2018

ISSN: 1747-6585,1747-6593

DOI: 10.1111/wej.12340