Results 71 to 80 of about 3,560 (200)

Taxonomy and Survey on Cybersecurity Control Schemes for Smart Grids

open access: yesIET Smart Grid, Volume 8, Issue 1, January/December 2025.
This work presents a taxonomy and a survey of cybersecurity control schemes specifically tailored for smart grids, considering vulnerabilities in IEC 61850 and the corresponding IEC 62351 security requirements. The taxonomy considers deployment strategies, analysis methods, mitigated threats and protected applications in power systems.
Aldo Insfrán   +2 more
wiley   +1 more source

IoT Intrusion Detection: Implementing a Dual‐Layered Security Approach

open access: yesInternational Journal of Intelligent Systems, Volume 2025, Issue 1, 2025.
The proliferation of Internet of Things (IoT) devices has significantly increased the attack surface, making IoT security a critical concern. Traditional intrusion detection systems often fall short in addressing the complex and staged nature of IoT attacks.
Erdal Özdoğan   +4 more
wiley   +1 more source

Techno-Economic Aspect of the Man-in-the-Middle Attacks

open access: yesCommunications, 2017
This paper analyzes some aspects of the man-in-the-middle (MITM) attacks. After a short introduction, which outlines the essence of this attack, there are presented used scientific methods and hypotheses.
Zoran Cekerevac   +3 more
doaj   +1 more source

A survey of cyber attacks on blockchain based IoT systems for industry 4.0

open access: yesIET Blockchain, Volume 4, Issue 4, Page 287-301, December 2024.
Abstract The industry 4.0 revolution leads by technologies such as distributed digital ledgers, big data processing techniques, automation, and the internet of things (IoT). The interest in the industrial internet of things (IIoT) has progressed rapidly with huge internet areas such as research, academics, and industries.
Aarju Dixit   +2 more
wiley   +1 more source

Analysis of data transfer security issues at particular OSI model layers [PDF]

open access: yes, 2009
Táto práca sa zaoberá analýzou protokolov zaisťujúcich zabezpečený prenos dát. V prvej časti je stručne popísaný referenčný model ISO/OSI. Druhá časť je zameraná na samotné zabezpečené protokoly na jednotlivých vrstvách ISO/OSI modelu, z ktorých je v ...
Kňazovický, Pavel
core  

A lightweight Intrusion Detection for Internet of Things‐based smart buildings

open access: yesSECURITY AND PRIVACY, Volume 7, Issue 4, July/Augusust 2024.
Abstract The integration of Internet of Things (IoT) devices into commercial or industrial buildings to create smart environments, such as Smart Buildings (SBs), has enabled real‐time data collection and processing to effectively manage building operations.
Amith Murthy   +2 more
wiley   +1 more source

Attacks on IEEE 802.11 wireless networks

open access: yesVojnotehnički Glasnik, 2013
Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity.
Dejan Milan Tepšić   +1 more
doaj   +1 more source

Enhancing resilience of advanced power protection systems in smart grids against cyber–physical threats

open access: yesIET Renewable Power Generation, Volume 18, Issue 5, Page 837-862, 6 April 2024.
Basic adaptive overcurrent relay protection scheme and highlight cyber threats. Abstract Recently, smart grids introduce significant challenges to power system protection due to the high integration with distributed energy resources (DERs) and communication systems.
Feras Alasali   +7 more
wiley   +1 more source

VoWi‐Fi security threats: Address resolution protocol attack and countermeasures

open access: yesIET Networks, Volume 13, Issue 2, Page 129-146, March 2024.
VoWi‐Fi call service is a vital access solution in the B5G/6G network. The authors proposed a defence algorithm that enables future apps or device manufacturers to assess the safety of the calling environment. Abstract B5G/6G networks are facing challenges in the deployment of additional base stations.
Kuan‐Chu Lu   +3 more
wiley   +1 more source

MiniCPS: A toolkit for security research on CPS Networks

open access: yes, 2015
In recent years, tremendous effort has been spent to modernizing communication infrastructure in Cyber-Physical Systems (CPS) such as Industrial Control Systems (ICS) and related Supervisory Control and Data Acquisition (SCADA) systems.
Antonioli, Daniele   +1 more
core  

Home - About - Disclaimer - Privacy