ENISA Documents in Cybersecurity Assurance for Industry 4.0: IIoT Threats and Attacks Scenarios.
Vladimir V. SklyarVyacheslav S. KharchenkoPublished in: IDAACS (2019)
Keyphrases
- countermeasures
- attack scenarios
- information security
- malicious attacks
- security threats
- denial of service attacks
- information retrieval
- security risks
- document collections
- computer security
- web documents
- insider attacks
- document retrieval
- relevant documents
- document classification
- attack detection
- security vulnerabilities
- metadata
- text documents
- data corruption
- real world
- document clustering
- insider threat
- sql injection
- cyber attacks
- security measures
- security breaches
- injection attacks
- buffer overflow
- network security
- intrusion detection system
- retrieval systems
- information retrieval systems
- xml documents
- ddos attacks
- security issues
- vector space model
- intrusion detection
- information extraction
- keywords
- case study
- information systems
- data mining