• Lietuvių
    • English
  • English 
    • Lietuvių
    • English
  • Login
View Item 
  •   DSpace Home
  • Mokslinės publikacijos (PDB) / Scientific publications (PDB)
  • Moksliniai ir apžvalginiai straipsniai / Research and Review Articles
  • Straipsniai kituose recenzuojamuose leidiniuose / Articles in other peer-reviewed sources
  • View Item
  •   DSpace Home
  • Mokslinės publikacijos (PDB) / Scientific publications (PDB)
  • Moksliniai ir apžvalginiai straipsniai / Research and Review Articles
  • Straipsniai kituose recenzuojamuose leidiniuose / Articles in other peer-reviewed sources
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Industrial Control Systems (ICS) cyber prediction model /

Thumbnail
View/Open
Katina_Industrial_Control_Systems_ICS_cyber_prediction_model.pdf (498.7Kb)
Date
2023.
Author
Katina, Joana,
Plėta, Tomas,
Petkevičius, Romualdas,
Lelešienė, Lina,
Metadata
Show full item record
Abstract
Acceleration of scientific and technical progress, speeding up of technological changes, IT process globalisation and integration of OT processes invoked new challenges in preparing cyber strategies. Issues with adapting strategy for a particular specificity, region and specific cyber-attacks are not applicable. Therefore, a natural need arises to adjust the process for future cyber-attacks. It should be noted that the vast majority of organisations still need to possess a strategy that has been developed in correlation with future cyber-attacks. A part of organisations, irrespective of the lack of methodology and necessary infrastructure at the initial stage, commenced applying strategic management methods as a more dynamic environment demanded adequate changes in the cyber security within the organisation itself. The organisation started to plan such changes because, at the initial stage of the strategic management theory development, the strategy was understood as a plan drawn up to achieve the set objectives, regardless of the future need. Implementing such strategic procedures is grounded on something other than scientific calculations and is often associated with excessive use of funds. Therefore, the main goal of this article is to determine how much the r-Interdiction Median Problem with Fortification (RIMF) module can be used as a model for deciding methods for protecting critical infrastructure systems.
Issue date (year)
2023.
URI
https://etalpykla.vilniustech.lt/xmlui/handle/123456789/153593
Collections
  • Straipsniai kituose recenzuojamuose leidiniuose / Articles in other peer-reviewed sources [8559]

 

 

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjects / KeywordsInstitutionFacultyDepartment / InstituteTypeSourcePublisherType (PDB/ETD)Research fieldStudy directionVILNIUS TECH research priorities and topicsLithuanian intelligent specializationThis CollectionBy Issue DateAuthorsTitlesSubjects / KeywordsInstitutionFacultyDepartment / InstituteTypeSourcePublisherType (PDB/ETD)Research fieldStudy directionVILNIUS TECH research priorities and topicsLithuanian intelligent specialization

My Account

LoginRegister