ISSN:
eISSN:
Disciplines
(Field of Science):
- information and communication technology (Engineering and Technology)
- biomedical engineering (Engineering and Technology)
- security studies (Social studies)
- management and quality studies (Social studies)
- computer and information sciences (Natural sciences)
(Field of Science)
Ministry points: Help
Year | Points | List |
---|---|---|
Year 2024 | 70 | Ministry scored journals list 2024 |
Year | Points | List |
---|---|---|
2024 | 70 | Ministry scored journals list 2024 |
2023 | 70 | Ministry Scored Journals List |
2022 | 70 | Ministry Scored Journals List 2019-2022 |
2021 | 70 | Ministry Scored Journals List 2019-2022 |
2020 | 70 | Ministry Scored Journals List 2019-2022 |
2019 | 70 | Ministry Scored Journals List 2019-2022 |
2018 | 25 | A |
2017 | 25 | A |
2016 | 25 | A |
2015 | 25 | A |
2014 | 20 | A |
2013 | 20 | A |
2012 | 25 | A |
2011 | 25 | A |
2010 | 13 | A |
Model:
Points CiteScore:
Year | Points |
---|---|
Year 2023 | 3.8 |
Year | Points |
---|---|
2023 | 3.8 |
2022 | 4 |
2021 | 3.3 |
2020 | 2.5 |
2019 | 2.2 |
2018 | 2.3 |
2017 | 2.8 |
2016 | 3.1 |
2015 | 2.5 |
2014 | 2.6 |
2013 | 2.1 |
2012 | 1.5 |
2011 | 1.3 |
Impact Factor:
Sherpa Romeo:
Papers published in journal
Filters
total: 3
Catalog Journals
Year 2015
-
Approaching Secure Industrial Control Systems
PublicationThis study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...
Year 2014
-
Operating system security by integrity checking and recovery using write-protected storage
PublicationThe paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...
Year 2011
-
Approach to security assessment of critical infrastructures' information systems
PublicationThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
seen 642 times