Results 51 to 60 of about 3,560 (200)

Data‐Driven Anomaly Detection and Mitigation for FACTS‐Based Wide‐Area Voltage Control System

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 10, Issue 1, January/December 2025.
Figure 4 presents the schematic diagram of data‐driven attack‐resilient system for the wide‐area voltage controller that seamlessly integrates machine learning‐based anomaly detector with rules‐based attack mitigation system while supporting the normal operation of WAVCS in real‐time.
Vivek Kumar Singh   +2 more
wiley   +1 more source

ACCESS CONTROL IN A LOCAL NETWORK USING THE BASIC CONFIGURATION OF NETWORK DEVICES

open access: yesСистемный анализ и прикладная информатика, 2018
The article focused on recommendations for the local network protection from unauthorized access of employees (insider attacks) on the basis of access control, using the basic settings of existing equipment.
S. N. Petrov   +3 more
doaj   +1 more source

Analysis and Demonstration of Selected Network Attacks [PDF]

open access: yes, 2012
Tato práce je zaměřená na problematiku síťových útoků, jejich popis a obranu proti nim. Kromě toho popisuje techniky, které může útočník použít při vytváření útoku.
Černeková, Alžbeta
core  

Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid [PDF]

open access: yes, 2016
The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable
Khan, Rafiullah   +4 more
core   +1 more source

Modelling False Data Injection and Denial of Service Attacks in Cyber‐Physical Microgrids

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 10, Issue 1, January/December 2025.
This paper aims to analyse the impact of cyberattacks on data transmission in cyber‐physical microgrids and to develop appropriate updated models for these systems. It investigates the effects of cyberattacks on the numerical stream data in microgrids, drawing upon experimental results to construct cyberattack models that can facilitate the development
Abbas Ahmadi   +2 more
wiley   +1 more source

Wireless Networks Security Flaws and Hacking Avenues of Attacks

open access: yesNTU Journal of Engineering and Technology
An access point offers wireless networking to several wireless client nodes in the shared medium when using IEEE 802.11 wireless local area networks in infrastructure mode. The related nodes could be at risk of security attacks.
Asmaa Akram Ghanim   +1 more
doaj   +1 more source

A Look Back at "Security Problems in the TCP/IP Protocol Suite" [PDF]

open access: yes, 2004
About fifteen years ago, I wrote a paper on security problems in the TCP/IP protocol suite. In particular, I focused on protocol-level issues, rather than implementation flaws.
Bellovin, Steven Michael
core   +2 more sources

Real‐Time Cyberattack Detection for SCADA in Power System

open access: yesIET Energy Systems Integration, Volume 7, Issue 1, January/December 2025.
ABSTRACT Supervisory Control and Data Acquisition (SCADA) systems monitor and control industrial processes, but their integration with information technology and network connectivity, including the internet, exposes them to potential cyber threats. As SCADA systems become essential infrastructure, their vulnerability to cyber‐attacks has increased ...
Botta Prudhvi   +2 more
wiley   +1 more source

Real-Time Detection and Identification of ARP Spoofing Attacks in Microgrids

open access: yesIEEE Access
The integration of smart devices and advanced communication infrastructure has turned power systems into cyber-physical systems (CPS), introducing cyber vulnerabilities. One such vulnerability arises from the use of the address resolution protocol (ARP),
Kalinath Katuri   +2 more
doaj   +1 more source

Seguridad en un data center en la nube a nivel de infraestructura [PDF]

open access: yes, 2017
Las organizaciones requieren acompañamiento por parte de profesionales y consultores que les permita determinar cómo implementar la seguridad que un data center en la nube, Teniendo en cuenta que los ataque de robo de información hoy en día se presentan ...
Jimenez Castro, Andres Fernando   +1 more
core  

Home - About - Disclaimer - Privacy