Search for dissertations about: "Information System Risk, security and Control"

Showing result 1 - 5 of 19 swedish dissertations containing the words Information System Risk, security and Control.

  1. 1. Security metrics and allocation of security resources for control systems

    Author : Jezdimir Milošević; Henrik Sandberg; Ling Shi; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Cyber-Security; Cyber-Attacks; Cyber-Physical Systems; Networked Control Systems; Model Based Impact Analysis; Security Metrics; Risk Management; Electrical Engineering; Elektro- och systemteknik;

    Abstract : Achieving a sufficient level of security of control systems is very important, yet challenging. Firstly, control systems operate critical infrastructures vital for our society. Hence, attacks against them can result in dire consequences. READ MORE

  2. 2. Toward Cyber-Secure and Resilient Networked Control Systems

    Author : André Teixeira; Henrik Sandberg; Karl H. Johansson; Kameshwar Poolla; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Cyber Security; Resilience; Industrial Control Systems; Fault-Tolerant Systems; Risk Management; Cyber säkerhet; Resiliens; Industriella Styrsystem; Riskanalys; Electrical Engineering; Elektro- och systemteknik;

    Abstract : Resilience is the ability to maintain acceptable levels of operation in the presence of abnormal conditions. It is an essential property in industrial control systems, which are the backbone of several critical infrastructures. READ MORE

  3. 3. Design and Analysis of Self-protection : Adaptive Security for Software Systems

    Author : Charilaos Skandylas; Narges Khakpour; Simin Nadjm-Tehrani; Linnéuniversitetet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Security Analysis; Self-Protection; Self-adaptive Systems; Verification; Information Flow Control; Risk Assessment; Computer Science; Datavetenskap;

    Abstract : Today's software landscape features a high degree of complexity, frequent changes in requirements and stakeholder goals, and uncertainty.Uncertainty and high complexity imply a threat landscape where cybersecurity attacks are a common occurrence while their consequences are often severe. READ MORE

  4. 4. Security Allocation in Networked Control Systems

    Author : Anh Tung Nguyen; André Teixeira; Emma Tegling; Uppsala universitet; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Elektroteknik med inriktning mot reglerteknik; Electrical Engineering with specialization in Automatic Control;

    Abstract : Sustained use of critical infrastructure, such as electrical power and water distribution networks, requires efficient management and control. Facilitated by the advancements in computational devices and non-proprietary communication technology, such as the Internet, the efficient operation of critical infrastructure relies on network decomposition into interconnected subsystems, thus forming networked control systems. READ MORE

  5. 5. Efficient Security Protocols for Constrained Devices

    Author : Martin Gunnarsson; Institutionen för reglerteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES;

    Abstract : During the last decades, more and more devices have been connected to the Internet.Today, there are more devices connected to the Internet than humans.An increasingly more common type of devices are cyber-physical devices.A device that interacts with its environment is called a cyber-physical device. READ MORE