Results 41 to 50 of about 574,096 (277)

Low Latency Detection of Sparse False Data Injections in Smart Grids

open access: yesIEEE Access, 2018
We study low-latency detections of sparse false data injection attacks in power grids, where an adversary can maliciously manipulate power grid operations by modifying measurements at a small number of smart meters. When a power grid is under attack, the
Israel Akingeneye, Jingxian Wu
doaj   +1 more source

False data injection attack in smart grid: Attack model and reinforcement learning-based detection method

open access: yesFrontiers in Energy Research, 2023
The smart grid, as a cyber-physical system, is vulnerable to attacks due to the diversified and open environment. The false data injection attack (FDIA) can threaten the grid security by constructing and injecting the falsified attack vector to bypass ...
Xixiang Lin   +3 more
doaj   +1 more source

Network attack detection at flow level

open access: yes, 2011
In this paper, we propose a new method for detecting unauthorized network intrusions, based on a traffic flow model and Cisco NetFlow protocol application.
C. Douligeris   +3 more
core   +1 more source

Personalized Selumetinib Dosing in Pediatric Neurofibromatosis Type 1: Insights From a Pilot Therapeutic Drug Monitoring Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Objective To evaluate selumetinib exposure using therapeutic drug monitoring (TDM) in pediatric patients with neurofibromatosis type 1 (NF1) and plexiform neurofibromas (PN), assess interpatient pharmacokinetic variability, and explore the relationship between drug exposure, clinical response, and adverse effects.
Janka Kovács   +8 more
wiley   +1 more source

Unambiguous state discrimination in quantum cryptography with weak coherent states

open access: yes, 2000
The use of linearly independent signal states in realistic implementations of quantum key distribution (QKD) enables an eavesdropper to perform unambiguous state discrimination.
A. Chefles   +18 more
core   +1 more source

MF‐RF: A detection approach based on multi‐features and random forest algorithm for improved collusive interest flooding attack

open access: yesIET Information Security, 2023
A new type of Collusive Interest Flooding Attack (CIFA), Improved Collusive Interest Flooding Attack (I‐CIFA), which originates from CIFA with a stronger concealment, higher attack effect, lower attack cost, and wider attack range in Named Data ...
Meng Yue, Silin Peng, Wenzhi Feng
doaj   +1 more source

Research on Attack Detection of Cyber Physical Systems Based on Improved Support Vector Machine

open access: yesMathematics, 2022
Cyber physical systems (CPS), in the event of a cyber attack, can have a serious impact on the operating physical equipment. In order to improve the attack detection capability of CPS, an support vector machine (SVM) attacks detection model based on ...
Fengchun Liu   +3 more
doaj   +1 more source

Threshold Verification Technique for Network Intrusion Detection System [PDF]

open access: yes, 2009
Internet has played a vital role in this modern world, the possibilities and opportunities offered are limitless. Despite all the hype, Internet services are liable to intrusion attack that could tamper the confidentiality and integrity of important ...
Faizal, M. A.   +5 more
core   +1 more source

Optimal Attack against Cyber-Physical Control Systems with Reactive Attack Mitigation

open access: yes, 2017
This paper studies the performance and resilience of a cyber-physical control system (CPCS) with attack detection and reactive attack mitigation. It addresses the problem of deriving an optimal sequence of false data injection attacks that maximizes the ...
Lakshminarayana, Subhash   +3 more
core   +1 more source

Evaluating the Utility of Paired Tumor and Germline Targeted DNA Sequencing for Pediatric Oncology Patients: A Single Institution Report

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Objective To evaluate the diagnostic yield and utility of universal paired tumor–normal multigene panel sequencing in newly diagnosed pediatric solid and central nervous system (CNS) tumor patients and to compare the detection of germline pathogenic/likely pathogenic variants (PV/LPVs) against established clinical referral criteria for cancer ...
Natalie Waligorski   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy