Results 1 to 10 of about 1,171,713 (299)

Cyber-attack method and perpetrator prediction using machine learning algorithms [PDF]

open access: yesPeerJ Computer Science, 2021
Cyber-attacks have become one of the biggest problems of the world. They cause serious financial damages to countries and people every day. The increase in cyber-attacks also brings along cyber-crime.
Abdulkadir Bilen, Ahmet Bedri Özer
doaj   +4 more sources

Generating ICS Anomaly Data Reflecting Cyber-Attack Based on Systematic Sampling and Linear Regression [PDF]

open access: yesSensors, 2023
Cyber threats to industrial control systems (ICSs) have increased as information and communications technology (ICT) has been incorporated. In response to these cyber threats, we are implementing a range of security equipment and specialized training ...
Ju Hyeon Lee   +3 more
doaj   +2 more sources

Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey. [PDF]

open access: yesSensors (Basel), 2022
Network Intrusion Detection Systems (NIDS) are designed to safeguard the security needs of enterprise networks against cyber-attacks. However, NIDS networks suffer from several limitations, such as generating a high volume of low-quality alerts. Moreover,
Albasheer H   +8 more
europepmc   +2 more sources

Security Risk Assessment Approach for Distribution Network Cyber Physical Systems Considering Cyber Attack Vulnerabilities. [PDF]

open access: yesEntropy (Basel), 2022
With the increasing digitalization and informatization of distribution network systems, distribution networks have gradually developed into distribution network cyber physical systems (CPS) which are deeply integrated with traditional power systems and ...
Zhou B   +5 more
europepmc   +2 more sources

A robust intelligent zero-day cyber-attack detection technique. [PDF]

open access: yesComplex Intell Systems, 2021
With the introduction of the Internet to the mainstream like e-commerce, online banking, health system and other day-to-day essentials, risk of being exposed to various are increasing exponentially. Zero-day attack(s) targeting unknown vulnerabilities of
Kumar V, Sinha D.
europepmc   +2 more sources

Probabilistic safety assessment-based importance analysis of cyber-attacks on nuclear power plants [PDF]

open access: yesNuclear Engineering and Technology, 2019
With the application of digital technology to safety-critical infrastructures, cyber-attacks have emerged as one of the new dangerous threats. In safety-critical infrastructures such as a nuclear power plant (NPP), a cyber-attack could have serious ...
Jong Woo Park, Seung Jun Lee
doaj   +3 more sources

Controller Cyber-Attack Detection and Isolation. [PDF]

open access: yesSensors (Basel), 2023
This article deals with the cyber security of industrial control systems. Methods for detecting and isolating process faults and cyber-attacks, consisting of elementary actions named “cybernetic faults” that penetrate the control system and destructively affect its operation, are analysed. FDI fault detection and isolation methods and the assessment of
Sztyber-Betley A   +3 more
europepmc   +4 more sources

A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection. [PDF]

open access: yesSensors (Basel), 2020
Currently, expert systems and applied machine learning algorithms are widely used to automate network intrusion detection. In critical infrastructure applications of communication technologies, the interaction among various industrial control systems and
Dutta V, Choraś M, Pawlicki M, Kozik R.
europepmc   +2 more sources

Cyber-attack research for integrated energy systems by the correlated matrix based object-oriented modeling method

open access: yesFrontiers in Energy Research, 2022
The rise of an integrated energy system requires the integration of multiple sources of energy to be embraced and transited over the power grid; that means the information and communication systems of traditional power systems will be extended, and their
Heqin Tong   +11 more
doaj   +1 more source

Data-Driven Cyber-Attack Detection of Intelligent Attacks in Islanded DC Microgrids

open access: yesIEEE transactions on industrial electronics (1982. Print), 2023
In this letter, a data-driven cyber-attack detection method for islanded dc microgrids is proposed. Data are collected by monitoring the behavior of an intelligent attacker who is able to bypass the conventional cyber-attack detection algorithms and ...
Yihao Wan, T. Dragičević
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy