ICS Village - ICS/ IOT Threat Landscape
Formal Metadata
Title |
| |
Title of Series | ||
Number of Parts | 335 | |
Author | ||
License | CC Attribution 3.0 Unported: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/48900 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
00:00
MereologyScheduling (computing)Multiplication signRepresentation (politics)Computer animation
00:26
Information securityPhysical systemControl flowContext awarenessHacker (term)Musical ensembleComputer animation
00:50
Physical systemState of matterInternet der DingeArrow of timeCybersexSound effectAttribute grammarDegree (graph theory)Computer animation
01:47
Type theoryVideo gameFörderverein International Co-Operative StudiesInformation securityWhiteboardPoint (geometry)Category of being10 (number)Endliche ModelltheorieType theoryPivot elementReal numberIntegrated development environmentMultilaterationMeeting/InterviewComputer animation
03:48
ComputerMultiplication signComputer animation
04:13
Information10 (number)Military operationNeuroinformatikDirection (geometry)MereologyData managementComplete metric spaceProcess (computing)Power (physics)Integrated development environmentSoftware testingRight angleGodRenewal theoryWater vaporAreaPhysicalismMathematicsGraph coloringComplex (psychology)Remote administrationException handlingVideo gameMultiplication signService (economics)DiagramEntire functionComputerDivisorContent (media)AnalogySurfaceReal numberComputer animation
07:35
MereologyOpen sourceComputer forensicsLevel (video gaming)FlagComplex (psychology)Attribute grammarExtreme programmingWordComputer animation
08:39
Computer networkComputer wormPhysical systemDependent and independent variablesPerspective (visual)NP-hardComputer forensicsDecision tree learningPoint (geometry)ChainSoftware2 (number)Right angleComputer wormAxiom of choiceDifferent (Kate Ryan album)Data miningAttribute grammarCybersexChaos (cosmogony)NeuroinformatikGoodness of fitFocus (optics)Incidence algebraTrailLevel (video gaming)Traffic reportingFlagPlastikkarteComputer animation
11:18
Chi-squared distributionMereologyEntire functionPhysical systemMedical imagingSlide ruleWordWindowError messagePersonal digital assistantLecture/Conference
12:32
PhishingPhysical systemSocial softwareHacker (term)Water vaporView (database)Touch typingWebsiteStrategy gameVirtual machineAttribute grammarInternet forumNeuroinformatikPhysicalismPhysical systemComputer virusIntegrated development environmentTotal S.A.CybersexMedical imagingSinc functionMalwareInstance (computer science)FlagMessage passingAxiom of choiceProfil (magazine)Combinational logicRight angleContent (media)InternetworkingAuthorizationError messageForm (programming)Computer animation
16:22
ChainIterationProcess (computing)PredictabilityProof theoryMereologyIterationPoint (geometry)Game theoryPhysical systemInfotainmentEndliche ModelltheorieIntegrated development environmentTouch typingChainComputer worm
18:02
Multiplication sign
18:22
InternetworkingPlastikkartePoint cloudComputer animation
18:58
PlastikkarteState of matterFacebookFunctional (mathematics)PlastikkarteEndliche ModelltheorieComputer animation
19:35
Proof theoryVulnerability (computing)Category of beingType theoryRight angleMultiplication signPhysical lawPatch (Unix)CodeVector spaceMultilaterationComputer animation
20:35
State of matterVector spaceCryptographyCellular automatonLink (knot theory)Scripting languageFactory (trading post)Default (computer science)Cycle (graph theory)MultilaterationPasswordNeuroinformatikCombinational logicMusical ensembleLibrary catalogSoftwareDifferent (Kate Ryan album)Proof theoryForcing (mathematics)Disk read-and-write headMultiplication signType theoryBand matrixVariety (linguistics)NumberExploit (computer security)Intrusion detection systemVector spaceMoore's lawComputer animation
22:26
Remote administrationMultilaterationComputer animation
22:57
Förderverein International Co-Operative StudiesInformationWhiteboardTwitterInformation securityComputer animation
23:17
Electronic data interchangeMusical ensembleMeeting/Interview
Transcript: English(auto-generated)