Governing Cybersecurity Risks and Benefits of the Internet of Things: Connected Medical and Health Devices and Connected Vehicles
Related publications (35)
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
The key to extending the service life of a historical masonry bridge is an accurate examination of its actual performance. This paper presents a risk-based safety approach which introduces a risk matrix illustrating the risk presented by a structure as a f ...
In this paper, we present a simulation-based investigation of the potential benefit of route-guidance information in the context of risk-sensitive travelers. We set up a simple two-route scenario where travelers are repeatedly faced with risky route-choice ...
Systemic risks and hazards have become increasingly significant features of modern industrial society of which the network industries form a vital element. The idea of systemic risk, however, is much less prominent in the network industries compared to ban ...
Traditionally, urban water services were characterised by local monopolies, where the incumbent was publicly-owned. This was explained by safety, health, economic, and technological reasons related to the sector's specificities. However, in spite of this, ...
This work characterizes the nature of the limit point of distributed strategies for adaptation and learning over networks in the general case when the combination policy is not necessarily doubly stochastic and when the individual risks do not necessarily ...
In a bandwidth-flooding attack, compromised sources send high-volume traffic to the target with the purpose of causing congestion in its tail circuit and disrupting its legitimate communications. In this paper, we present Active Internet Traffic Filtering ...
Available risk analysis techniques are well adapted to industry since they were developed for its purpose. All hazards met in industry are also present in research/academia (although quantities of some hazardous substances are smaller). Still, because of i ...
Recent large-scale blackouts and other incidents have shown that failures in network industries can have serious economic and social consequences. A large body of literature covers critical infrastructures (and their protection), but most of it is confined ...
The impact of capital mobility restrictions on the diversification benefit for risk at the group level of a financial conglomerate is an important aspect in risk management. In this paper we propose a new bottom-up approach for realizing diversification be ...
Vulnerability is estimated in terms of the effects that IEMI may induce to the services provided by the facility under study. We estimate the vulnerability by considering three variables: the likelihood, the risk, and the hardness. The different parameters ...