Results, demos etc. overview

Sort by


Mindsphere Security Model

Updated at: 09-08-2019

Show more information
Acronym Mindsphere_Security
Title Mindsphere Security Model
Description https://assets.new.siemens.com/siemens/assets/api/uuid:6b876b5e-5594-4da4-90e0-e9e0c6f1f1e1/version:1557483304/siemens-plm-mindsphere-security-model-wp-75966-a7.pdf
Show more information
Acronym IndustrialInternetSecurityFramework_IISF
Title The Industrial Internet Security Framework (IISF)
Description It  describes  their  security  characteristics,  technologies  and  techniques  that  should  be  applied,  methods for addressing security,
Show more information
Acronym ENISA_GoodPracticesSecurityIoT_Manufacturing
Title ENISA Good Practices for Security of Internet of Things in the context of Smart Manufacturing
Description The main objectives were to collect good practices to ensure security of IoT in the context of Industry 4.0/Smart Manufacturing, while mapping the relevant security and privacy challenges, threats, risks

CIF Seminar - "Cybersecurity Act"

Updated at: 26-03-2021

Show more information
Acronym CIF_Cybersecurity_Act_Michiel Fierens_2020
Title CIF Seminar - "Cybersecurity Act"
Description CIF Seminar - "Cybersecurity Act" (Michiel Fierens) The aim of this presentation is to provide some basic inputs about the most recent legislation on cybersecurity issued by the EU.

5G Security Architecture

Project: 5G-Ensure

Updated at: 23-06-2018

Show more information
Acronym 5G Security Architecture
Title 5G Security Architecture
Description The security architecture builds on the current 3GPP security architecture (TS 33.401) where the network and its security functionalities are represented in terms of domains, strata and security feature

5G Security and Privacy Enablers

Project: 5G-Ensure

Updated at: 23-06-2018

Show more information
Acronym 5G Security and Privacy Enablers
Title 5G Security and Privacy Enablers
Description A second final set of security enablers have now been specified as completely new solutions as well as additional features of the enablers already available.
Show more information
Acronym Viability of WSN as ICT overlay for physical security detection
Title D4.6 Viability of WSN as ICT overlay for physical security detection
Description For physical security detection and determination, a number of typical sensors used for security purposes are covered. A general high-level specification of the final system is laid out as well.