ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Process Safety and Cyber Security Convergence: Lessons Identified, But Not Learnt?
Resilience, Security & Risk in Transport
◽
10.1049/perrsr3e_ch3
◽
2013
◽
pp. 14-20
Author(s):
R. S. Piggin
Keyword(s):
Cyber Security
◽
Process Safety
Download Full-text
Related Documents
Cited By
References
Process safety and cyber security convergence: Lessons identified, but not learnt?
8th IET International System Safety Conference incorporating the Cyber Security Conference 2013
◽
10.1049/cp.2013.1699
◽
2013
◽
Cited By ~ 2
Author(s):
R.S.H. Piggin
Keyword(s):
Cyber Security
◽
Process Safety
Download Full-text
Offshore Process Safety
10.1016/s2468-6514(18)x0002-6
◽
2018
◽
Keyword(s):
Process Safety
Download Full-text
Catastrophe Model of the Accident Process, Safety Climate, and Anxiety
PsycEXTRA Dataset
◽
10.1037/e534642010-001
◽
2010
◽
Cited By ~ 1
Author(s):
Stephen J. Guastello
◽
Mark Lynn
Keyword(s):
Safety Climate
◽
Process Safety
◽
Catastrophe Model
Download Full-text
Perspectives on the role of cognition in cyber security
PsycEXTRA Dataset
◽
10.1037/e572172013-056
◽
2012
◽
Author(s):
Michael McNeese
◽
Nancy J. Cooke
◽
Anita D'Amico
◽
Mica R. Endsley
◽
Cleotilde Gonzalez
◽
...
Keyword(s):
Cyber Security
Download Full-text
Integrating Knowledge-Based and Mathematical Programming Approaches for Process Safety Verification
Computers & Chemical Engineering
◽
10.1016/s0098-1354(97)00164-6
◽
1997
◽
Vol 21
(1-2)
◽
pp. S905-S910
Author(s):
R Srinivasan
Keyword(s):
Mathematical Programming
◽
Process Safety
◽
Safety Verification
◽
Knowledge Based
Download Full-text
Towards Comprehensive Threat Modeling for Intelligent Vehicle Cyber Security
CICTP 2017
◽
10.1061/9780784480915.453
◽
2018
◽
Author(s):
Haojie Ji
◽
Guizhen Yu
◽
Yunpeng Wang
◽
Zhao Zhang
◽
Hongmao Qin
Keyword(s):
Cyber Security
◽
Intelligent Vehicle
◽
Threat Modeling
Download Full-text
INFORMATION AND CYBER SECURITY OF ATTORNEY'S ACTIVITY: THEORETICAL AND PRACTICAL ASPECTS (THE EXPERIENCE OF THE USA)
Comparative-analytical law
◽
10.32782/2524-0390/2020.1.79
◽
2020
◽
pp. 321-324
Author(s):
A.A. Zavadskyi
Keyword(s):
Cyber Security
◽
The Usa
Download Full-text
On Cyber-security of Augmentation Networks
Proceedings of the 2019 International Technical Meeting of The Institute of Navigation
◽
10.33012/2019.16700
◽
2019
◽
Author(s):
Alessandro Neri
◽
Sara Baldoni
◽
Roberto Capua
Keyword(s):
Cyber Security
Download Full-text
Technical Exchange: Applying Process Safety Management Principles to Manage Indoor Environmental Quality
The Synergist
◽
10.3320/1.2928456
◽
2004
◽
Vol 15
(10)
◽
pp. 40
Author(s):
Robert L. Collins
Keyword(s):
Environmental Quality
◽
Safety Management
◽
Indoor Environmental Quality
◽
Process Safety
Download Full-text
Characteristics of cyberspace, cyber terrorism, and the change of cyber security strategy
Gachon Law Review
◽
10.15335/glr.2018.11.4.009
◽
2018
◽
Vol 11
(4)
◽
pp. 251-284
Author(s):
Minwoo Yun
◽
Keyword(s):
Cyber Security
◽
Security Strategy
◽
Cyber Terrorism
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close