Results 61 to 70 of about 3,560 (200)

Cyber–Physical–Social Security of High‐DER‐Penetrated Smart Grids: Threats, Countermeasures, and Challenges

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
With the trend of large‐scale renewable distributed energy sources (DERs) penetrating into the smart grids (SGs), the SGs entail heavy reliance on information and communication technologies (ICT) and increasing impact of social behaviors on system operation and management. The SGs can be viewed as cyber–physical–social systems (CPSSs).
Qiuyu Lu   +4 more
wiley   +1 more source

Anomalous Traffic Detection and Self-Similarity Analysis in the Environment of ATMSim

open access: yesCryptography, 2017
Internet utilisation has steadily increased, predominantly due to the rapid recent development of information and communication networks and the widespread distribution of smartphones.
Hae-Duck J. Jeong   +3 more
doaj   +1 more source

Tool for the Analysis of Network Wireless Security [PDF]

open access: yes, 2014
Tato práce se zabývá bezpečností bezdrátových sítí a počítačovými útoky. Obsahuje popis různých zabezpečení sítí, nejznámějších útoků a nástrojů, kterými jsou útoky proveditelné.
Šenovský, Jakub
core  

Enhanced Cybersecurity Framework for Unmanned Aerial Systems: A Comprehensive STRIDE‐Model Analysis and Emerging Defense Strategies

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Recent advancements in unmanned aerial vehicle (UAV) technology have facilitated its widespread adoption across a spectrum of sectors, such as commercial logistics, agricultural surveillance, industrial diagnostics, and military maneuvers. However, the widespread adoption has also engendered a burgeoning array of security concerns.
Hailong Xi   +8 more
wiley   +1 more source

ОСОБЛИВОСТІ РЕАЛІЗАЦІЇ МЕРЕЖЕВИХ АТАК ЧЕРЕЗ TCP/IP-ПРОТОКОЛИ

open access: yesКібербезпека: освіта, наука, техніка
У статті здійснено дослідження особливостей реалізації типових мережевих атак, що ґрунтуються на експлуатації уразливостей протоколів стеку TCP/IP, які є критичною інфраструктурною основою глобальної мережевої взаємодії.
Юлія Костюк   +5 more
doaj   +1 more source

An Effective Technique of Zero‐Day Attack Detection in the Internet of Things Network Based on the Conventional Spike Neural Network Learning Method

open access: yesIET Networks, Volume 14, Issue 1, January/December 2025.
Figure 1 illustrates the zd‐csnn method's three levels. ABSTRACT The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks.
Nadia Adnan Shiltagh Al‐Jamali   +2 more
wiley   +1 more source

Design and Implement of Intrusion Prevention System Based on Snort and IP Tables

open access: yesJournal of Computing Research and Innovation
In the era of rapid advancement in communication and computer technology, network security has become a crucial issue, especially in wireless networks.
Lutfi Dwi Naldi, Apro Siswanto
doaj   +1 more source

Virtual Environments Support Insider Security Violations

open access: yes, 2008
This paper describes an investigation into how an employee using a virtual environment can circumvent any or all of the security, policies and procedures within an organization.
Swanson, Iain, Williams, Patricia
core   +1 more source

Enhancing Smart City Security: An Intrusion Detection System Using Machine Learning Methods With the UNB CIC IoT 2023 Dataset

open access: yesIET Smart Cities, Volume 7, Issue 1, January/December 2025.
Security of smart cities using machine learning methods. ABSTRACT Smart cities, characterised by their extensive use of IoT devices, aim to enhance urban living through improved efficiency, sustainability and quality of life. However, the widespread integration of IoT technology introduces significant cybersecurity challenges, including vulnerabilities
Mehdi Houichi   +2 more
wiley   +1 more source

MAC Spoofing Detection Via Wireshark [PDF]

open access: yes, 2018
When computers are, connect on any network a network card is used, known as NIC card which is having a MAC address. This address is use to distinguish one system from another we may say that it is the physical address given by the manufacturer to provide
Abid, M. K. (Ms), Singh, M. A. (Mr)
core  

Home - About - Disclaimer - Privacy